Evaluate the claim we can predict who will become a criminal - Criminal
Assignment info under CriminalBassignment
Please follow rubrics and the instruction at the bottom.
- APA Style
Topic: Evaluate the claim “we can predict who will become a criminal”.
Maximum word length: 1500 words not including reference list or table of contents.
To start you off on this topic you should look at the following 3 articles. You will then need to source an additional 15 articles from peer-reviewed journals. Additional information and guidance of literature searching will be given in workshops and online.
Herrenkohl, T. I., Jung, H. J., & Lee, J. O. (2017). Effects of child maltreatment, cumulative victimization experiences, and proximal life stress on adult crime and antisocial behavior. Summary Report for US Department of Justice.
Keatley, D. A., Golightly, H., Shephard, R., Yaksic, E., & Reid, S. (2018). Using behavior sequence analysis to map serial killers’ life histories. Journal of interpersonal violence, 0886260518759655.
Monahan, J. (1984). The prediction of violent behavior. American Journal of Psychiatry, 141(1), 10-15.
Using these articles and other research to justify your position, you will need to draw a conclusion about the predictive accuracy of tools and methods that predict the likelihood of offending.,
My Expectations:
· You can choose any crime behaviour you like. Articles listed above are for example purposes. You can look at other areas covered in the course.
· I want to distinguish between your own opinion and your conclusion. You will be aware that we do not want your opinion about a topic. An opinion is your subjective belief about a topic. A conclusion is your position based a review and interpretation of academic literature. I am interested in your ability to read and synthesise academic literature and come to a conclusion based on an integration the relevant material.
· Structure your paper. Use informative headings and sub-headings to guide the reader through your paper. Create a table of contents from these headings and subheadings at the beginning of your paper. There is a function for this in WORD and if you are not familiar with it, now is the time to learn to use it. The table of contents does not comprise part of the word limit.
· In order to write this paper you will need to do research, i.e. find empirical and theoretical research from peer reviewed journals. Analyse this research and demonstrate how it is relevant to the topic.
· You are expected to use your critical and analytical skills in this essay. Avoid mere description or regurgitation. Both your observations and your use of other peoples writing should reflect this critical/analytical dimension. In sum, your intellectual input should be clearly discernible in the paper. Remember the 5 Cs: cite, compare, contrast, connect, critique (See https://intranet.ecu.edu.au/__data/assets/pdf_file/0011/20621/literature_review.pdf
)
· You are not marked for your political or social views or opinions, but rather for your ability to present coherent, rational and logical arguments, properly supported by research.
· You are also assessed on your ability to express yourself clearly, logically and succinctly. Poor expression, grammar, punctuation and spelling will detract from your overall mark.
· Do not directly quote form sources. Instead, you must paraphrase: put the ideas expressed in the literature in your own words. You must provide a reference every time you paraphrase words, facts and ideas found in the literature. The in-text references (required by APA style) are included in the word limit. Include a reference list at the end of your assignment. The reference list should be a separate page at the end of the essay and is not included in the word limit. Use the APA referencing style – see http://libguides.murdoch.edu.au/APA for more information.
· Please note that your research effort, demonstrated by your engagement with the material you have found, analysed and implemented into your own writing (and properly referenced) will be the central pillar for the mark you will receive.
General instructions for completing assignments in this unit
Before you submit any work for this unit, please ensure it conforms to the following parameters:
1. Submit your paper as a WORD document only.
1. You may not use direct quotes in your work. Restate and rework key points from published research into your own words.
1. You may not use secondary citations. Go and find the original source or find another way to substantiate your claims.
1.
Do not
include a cover page. A title above the start of your work is all that is required.
1. Only put your student number in the header or footer, not your name. I blind mark and this helps ensure impartiality.
1. The word limit is the longest your essay can be (excluding the reference list). Your work may be under the word limit if you feel that you can sufficiently answer the question in less, but it may not be over. There is no + or – 10\%. 1 mark will be deducted for every 50 words that you are over the word limit (e.g. 2001 words = 1 mark deducted, 2051 words = 2 marks deducted).
1. Include a word count at the end of the essay (excluding the reference list). I will check the word count before I start marking.
1. Please note that when you submit your essay for marking, your assignment will be automatically submitted for scanning by the university electronic plagiarism detection software, Urkund (see below, for more detail). All cases of academic misconduct will be reported without exception in accordance with the University’s policies: (https://policy.murdoch.edu.au/dotNet/documents/?docid=1353&LinkedFromInsertedLink=true&public=true)
Urkund is a pattern-matching system designed to compare work submitted by students with other sources from the internet, journals/periodicals, and previous submissions that have been made to Urkund. Its primary purpose is to detect any submitted work that is not original and provide a thorough comparison between the submitted document and the original sources.
More information about Urkund is available at: http://our.murdoch.edu.au/Student-life/Study-successfully/Referencing-and-citing/Using-Urkund/
1. Familiarise yourself with the “What I need to know” link on the Murdoch website. This includes links relating to:
8. Links to the Assessment Policy;
8. A description of Academic Integrity;
8. Examinations;
8. Non-discriminatory language;
8. Student appeals;
8. Student complaints;
8. Conscientious objection and assessment policy;
8. Determination of grades from components/marks; and
8. Information for equity students
1. As to ease of comprehension, I suggest you ask a student/friend/parent/sibling not enrolled in this unit to read your work and ask them if it is easy to understand. Even reading your essay out aloud will assist in detecting minor grammatical and/or punctuation errors that are easily overlooked when proofreading.
Marking criteria for essay
The essay will be marked according to the following rubric. The marks are out of 100\%. The essay is worth 30\% of the unit mark.
Objective/criteria
(Total 100\%)
Performance indicators
Less than 50\%
Around 65\%
Over 80\%
Research skills and knowledge of subject matter
(35\%)
(less than 17\%)
Refers to a limited range of materials (less than that recommended) and/or references to dubious sources (e.g., Wikipedia) and/or overreliance on certain sources.
( ≈ 22\%)
Adequate number of sources consulted, and good/accurate comprehension of the broad issues.
( ≤ 28\%)
Excellent range and quality of resources consulted; excellent understanding and grasp of subject matter displayed. Excellent comprehension of both the broader picture and the nuances of the topic.
Grammar, punctuation and spelling
(15\%)
(less than 8\%)
Contains many errors.
( ≈ 10\%)
Contains a few of errors.
( ≤ 12\%)
Contains almost no errors.
Persuasive and cogently written
(20\%)
(less than 10\%)
Relies only on available material without attempting own analysis. May be overly colloquial, or too flowery.
( ≈ 13\%)
Sufficiently detailed analysis given word limit, displays some critical thinking and original viewpoint. Writes in plain English most of the time.
( ≤ 16\%)
Balances narrative and analysis, makes valuable contribution to debate with novel or original viewpoint; supports arguments with material from the litrerature. Writes in plain English.
Structure
(20\%)
(less than 10\%)
Does not keep on track. Does not contain clear structure.
( ≈ 13\%)
Intro, body and conclusion linked and effectively explained. Issues separated but interaction explained.
( ≤ 16\%)
Exceptionally well thought out structure, which aids the overall persuasiveness of the paper.
Appropriately referenced within and at end of essay and within word limit
(10\%)
(less than 5\%)
No reference section OR over word limit.
( ≈ 7\%)
Incomplete reference section (missing information or incorrect format).
( ≤ 8\%)
Complete reference section appropriately laid out.
A timeline toolkit for cold case
investigations
David Keatley and David D. Clarke
Abstract
Purpose – The purpose of this paper is to outline a variety of related methods for helping with criminal
(cold) case investigations. Despite the best efforts of police investigations, many cases around the world
run out of leads and go cold. While many police departments around the world have developed specialist
groups and task forces, academics have also been developing new methods that can assist with
investigations.
Design/methodology/approach – Cold cases, by their very nature, typically comprise incomplete data
sets that many traditional statistical methods are not suited to. Groups of researchers have therefore
developed temporal, dynamic analysis methods to offer new insights into criminal investigations. These
methods are combined into a timeline toolkit and are outlined in the current paper.
Findings – Methods from the timeline toolkit have already been successfully applied to many cold cases,
turning them back into current cases. In this paper, two real-world cold cases are analysed with methods
from the timeline toolkit to provide examples of how these methods can be applied in further cold cases.
Originality/value – Methods from the timeline toolkit provide a novel approach to investigating current
and cold cases. This review provides academics and practitioners with a guide to begin using and
developing these methods and forming successful collaborations with police departments and cold case
task forces. The methods are also suitable for wider groups and to use in their investigations.
Keywords Methods, Cold case, Investigations, Temporal analysis, Sequence analysis, Timeline toolkit
Paper type Case study
Every crime occurs across varying periods of time. One task facing investigators is to
determine the chain of events that occurred during the commission of a crime. Sometimes
this is relatively simple, based on forensic evidence or eyewitness testimony, other times it
may come down to judgement and heuristics. Despite the best efforts of investigators,
criminal cases may run out of leads or evidence to test, and go “cold”. Such cold cases
have gained widespread media interest in recent years, leading to the development of
specialised Cold Case Task Forces, which typically involve groups of specialists from
police detectives to forensic odontologists. These task forces review cases and consider
what new methods or technology may be used to assist with solving or closing a cold case.
Alongside the advancements made in forensic sciences, academics in the social sciences,
such as psychology and criminology, have also developed new methods and processes
that can assist with police investigations and cold cases. However, from the outset it should
be made clear: these methods do not solve cases. They are provided as a means for
academics to understand how temporal methods can be applied to cold cases, as well as
for detectives to approach their cases from a new angle. The timeline toolkit does not
provide a “magic bullet” to solving cases, but it can be used to bridge the gap between
academics in criminology and psychology, and detectives.
Traditional approaches to research in disciplines such as psychology have focussed on
individual risk factors that are “tested” in statistical approaches such as (hierarchical)
David Keatley is based at
Researchers in Behaviour
Sequence Analysis
(ReBSA), Nottingham, UK
and School of Law,
Murdoch University, Perth,
Australia.
David D. Clarke is based at
the Researchers in
Behaviour Sequence
Analysis (ReBSA) and
School of Psychology,
University of Nottingham,
Nottingham, UK.
Received 16 September 2019
Revised 8 November 2019
Accepted 13 November 2019
DOI 10.1108/JCP-09-2019-0039 VOL. 10 NO. 2 2020, pp. 47-63, © Emerald Publishing Limited, ISSN 2009-3829j JOURNAL OF CRIMINAL PSYCHOLOGYj PAGE 47
http://dx.doi.org/10.1108/JCP-09-2019-0039
regression models or multilevel modelling, for example, in forensic psychology, research
into attitudes and perceptions are commonly conducted. While this provides some
interesting information on the cognitions of students (used as a proxy for offenders), it has
limited applied value. Furthermore, the statistics underpinning such studies (e.g. regression
analyses) posit a number of predictor variables on a single outcome behaviour[1].
Therefore, groups of researchers have turned to novel approaches to understand criminal
behaviours (Keatley, 2018; Taylor et al., 2008) as well as investigating cold cases or crime
scene behaviours (Ferguson, 2015, 2019). The focus of this paper is to outline a series of
methods that academics have been using in the area of forensics and criminology,
collectively termed the Timeline Toolkit, as they share a commonality in focussing on
temporal episodes of behaviours. Each method will be listed and explained in this paper.
Finally, two real-world cold cases will be investigated through two of the “tools” in the
timeline toolkit, crime script analysis (CSA; Cornish, 1994; Leclerc and Wortley, 2013) and
Behaviour Sequence Analysis (BSA; Clarke and Crossland, 1985; Ivanouw, 2007; Keatley,
2018), to show investigators how such approaches may assist with their investigations. The
aim is to bridge the gap between cold case detectives and academics.
Data collected in most controlled, laboratory studies in academia are typically complete
and relatively well-structured. While the researcher may not know the outcome of the study,
they likely know what the data will look like, and missing data are purposefully kept to a
minimum. This makes for clearer data from which results can be seen and conclusions
drawn; however, such methods are less useful in real-world contexts and cases, wherein
the data or evidence are typically unstructured, competing, missing and/or chaotic. Many
cold cases have significant gaps in knowledge or evidence, and attempting to run
conventional statistical techniques would not only be unwise, but in many cases would not
even be possible. While many detectives are open to any additional input and advice
available for their cold cases, they are under intense pressure to solve their cases in a way
that is defensible in court. Many cases that have gone cold lack the forensic evidence
necessary to solve them. It is at this stage, in particular, that methods from the timeline
toolkit can be of most use: providing fresh insight or novel understanding. It should
be made clear, however, that while the methods have proven useful in a number of cold
cases already, they are not a magical remedy to fix or solve all cases. Sound detective work
and expertise is, and will always be, central to solving crimes. The timeline toolkit, however,
offers several methods that can help investigations along the way.
Timeline Toolkit
Everything we do happens over the course of episodes in time. These episodes may span
from a few seconds to many years, but the process for analysing them remains similar.
Timelines are like maps, in the same way that a map can be zoomed-in on for street-level
detail, or zoomed-out of to global scales, maps and directions still follow the same
principles. Within temporal analyses, there are a number of techniques for analysing the
progression of behaviours and events across time. For investigative purposes, this allows
academics to analyse either life histories of potential suspects or victims (Keatley, Golightly,
Shephard, Yaksic and Reid, 2018), or crime-scene-specific behaviours (Fossi et al., 2005;
Keatley et al., 2017; Lawrence et al., 2010). The scale may change, but the directions or
methods remain the same.
Recently, a group of academics have formed an international network of specialists in
methods for temporal analyses: Researchers in Behaviour Sequence Analysis (ReBSA;
www.ReBSA.co.uk). The “timeline toolkit” refers to a number of methods for temporal
analyses that members of ReBSA have either developed or used. Across most of the
methods used in the timeline toolkit, the underlying principle is to analyse the progression of
behaviours or events. To do this, an episode first needs to be broken down, or parsed, into
discrete parts. These parts may refer to behaviours (e.g. stabs victim, moves body), or
PAGE 48j JOURNAL OF CRIMINAL PSYCHOLOGYjVOL. 10 NO. 2 2020
http://www.ReBSA.co.uk
events (e.g. graduates school, loses job and divorce), or “chunks of time” in which a count
of how many behaviours occur is measured (e.g. number of burglaries between 10 p.m.
and midnight; number of attacks reported from 2012 to 2013). The parsing process is
typically straightforward; however, it is sometimes not necessarily clear when a behaviour
starts and ends. For example, “shoots a gun” is a relatively discrete behaviour that is clearly
marked in time as beginning (pulling the trigger) and ending (gun fires); however, cognitive
states (e.g. depression) or diffuse, prolonged behaviours (e.g. physical abuse) may occur
over an extended period with start-and-end points less clearly defined. Researchers,
however, have developed the tools to account for and analyse all of these types of
behaviour. The focus of researchers working with timeline toolkit methods is to make the
methods fit the data, not vice versa. Therefore, an aim of the present research is to bridge
the gap between cold case detective work and academic methodology (see Table I, for
examples). Many of the methods in the timeline toolkit are newly developed (e.g. behaviour
fingerprinting; behaviour tracking) and clearly need to be re-tested over multiple cases – as
is made clear by the authors of those methods. However, the underpinning metrics in those
papers is based on well-researched approaches (e.g. Markov modelling). Again, these
methods are not like forensic tests – hence they are not “solving” a case, but the methods
do allow for novel ways of understanding or investigating a crime – perhaps opening a new
line of enquiry for police to explore. Of course, academics should continue developing
these methods and exploring their reliability across different cases[2].
Once behaviours have been parsed or split into separate parts, the next stage is to
categorise or code them. This allows a “dictionary” of sorts to be built so that other
investigators and researchers can immediately see what each behaviour entailed, with a
description, as well as allowing future cases to be added to the database or compared to
existing, known cases. The categorisation stage does typically take longer than the parsing
stage. It is important that behaviours are categorised appropriately so that they are
meaningful in a legal context, as well as for research purposes. For example, if a crime is
classified as “burglary” it may not be immediately clear in legal terms what specific
behaviours have been performed. In the UK, for example, burglary is defined as several
different types or categories, each with specific behaviours. In the USA, “breaking and
entering” defines a similar type of crime to burglary, but with some key differences in the
individual behaviours being performed (Keatley, 2018). This is also why the creation of a
code book is particularly useful, so that future researchers, analysts or officers know exactly
what is meant by each category. There has been a trend in research to use sophisticated
terms to explain concepts, which can sometimes alienate end-users, who either do not have
the time to understand what is meant by the new term, or who may feel underwhelmed when
they realise the sophisticated term relates to something they already knew. Simple category
terms are therefore best in timeline analyses.
Once a criminal episode has been parsed and categorised, there are a number of analyses,
depending on which method has been used. The main underlying principle of all analyses is:
what is the order of behaviours and events across time. An overarching benefit of most of the
methods in the timeline toolkit is that they have been developed with end-users in mind and
outputs are typically shown in a way that non-expert audiences can understand and interpret
results. While the methods are all underpinned by scientific principles and in some cases
advanced statistical analyses (e.g. T-pattern analysis; Magnusson, 2000), the output is simplified
for wider audiences. Alongside the intuitive appeal of a method that takes the experience and
expertise of the detectives involved and builds on it, the presentation of complex results in clear
outputs is a benefit of these methods.
Criminology and the timeline toolkit
All of the methods in the timeline toolkit can be applied to any area of human
behaviour; however, there has been a recent surge in the temporal analyses of crime
VOL. 10 NO. 2 2020 j JOURNAL OF CRIMINAL PSYCHOLOGYj PAGE 49
T
a
b
le
I
T
im
e
lin
e
to
o
lk
it
m
e
th
o
d
s,
d
e
sc
ri
p
tio
n
s,
a
n
d
a
ss
o
ci
a
te
d
a
u
th
o
rs
N
a
m
e
o
f
m
e
th
o
d
D
e
s
c
ri
p
ti
o
n
A
p
p
lic
a
ti
o
n
/E
x
a
m
p
le
R
e
fe
re
n
c
e
s
/A
u
th
o
rs
a
s
s
o
c
ia
te
d
B
e
h
a
v
io
u
r
s
e
q
u
e
n
c
e
a
n
a
ly
s
is
(B
S
A
)
T
h
is
is
o
n
e
o
f
th
e
m
o
s
t
p
re
v
a
le
n
t
m
e
th
o
d
s
o
f
s
e
q
u
e
n
c
e
a
n
a
ly
s
is
.
It
is
a
v
e
ry
d
a
ta
-d
ri
v
e
n
,
b
o
tt
o
m
-u
p
a
p
p
ro
a
c
h
in
w
h
ic
h
in
d
iv
id
u
a
l,
d
is
c
re
te
b
e
h
a
v
io
u
rs
a
re
p
a
rs
e
d
,
c
a
te
g
o
ri
s
e
d
,
a
n
d
a
n
a
ly
s
e
d
.
It
is
th
e
fo
u
n
d
a
ti
o
n
o
n
w
h
ic
h
o
th
e
r
te
c
h
n
iq
u
e
s
a
re
b
a
s
e
d
/i
n
te
g
ra
te
d
(i
.e
.
c
a
rd
s
o
rt
in
g
,
b
e
h
a
v
io
u
r
tr
a
c
k
in
g
,
b
e
h
a
v
io
u
ra
lf
in
g
e
rp
ri
n
ti
n
g
,
h
id
d
e
n
M
a
rk
o
v
m
o
d
e
lli
n
g
)
U
s
e
d
to
o
u
tl
in
e
th
e
p
o
s
s
ib
le
p
ro
g
re
s
s
io
n
o
f
e
v
e
n
ts
,
c
o
n
n
e
c
ti
n
g
e
v
id
e
n
c
e
s
e
e
n
a
t
c
ri
m
e
s
c
e
n
e
.
C
a
n
a
ls
o
b
e
u
s
e
d
to
a
n
a
ly
s
e
v
e
rb
a
lu
tt
e
ra
n
c
e
s
(e
.g
.
9
1
1
c
a
lls
,
th
re
a
ts
a
n
d
d
e
m
a
n
d
s
)
C
la
rk
e
a
n
d
C
ro
s
s
la
n
d
(1
9
8
5
),
K
e
a
tl
e
y
(2
0
1
8
),
K
e
a
tl
e
y
,
M
a
ro
n
o
a
n
d
C
la
rk
e
(2
0
1
8
),
M
a
ro
n
o
e
t
a
l.
(2
0
1
7
),
(R
e
B
S
A
.c
o
.
u
k
)
C
a
rd
s
o
rt
in
g
A
s
e
ri
e
s
o
f
c
a
rd
s
a
re
u
s
e
d
to
d
is
p
la
y
th
e
te
m
p
o
ra
l
p
ro
g
re
s
s
io
n
o
f
e
v
e
n
ts
a
n
d
b
e
h
a
v
io
u
rs
.
T
h
is
h
a
s
b
e
e
n
u
s
e
d
in
s
e
lf
-h
a
rm
re
s
e
a
rc
h
p
re
v
io
u
s
ly
,
th
o
u
g
h
th
e
in
te
rv
ie
w
in
g
o
f
w
it
n
e
s
s
e
s
c
o
u
ld
b
e
n
e
fi
t
fr
o
m
th
is
te
c
h
n
iq
u
e
,
w
h
ic
h
c
a
n
im
p
ro
v
e
re
c
a
ll
a
n
d
a
c
t
a
s
p
ro
m
p
ts
fo
r
fu
rt
h
e
r
q
u
e
s
ti
o
n
in
g
U
s
e
fu
lf
o
r
w
it
n
e
s
s
/r
e
la
ti
v
e
s
w
h
o
m
a
y
fi
n
d
it
h
a
rd
e
r
to
s
p
e
a
k
a
b
o
u
t
th
e
e
v
e
n
ts
.
A
n
o
v
e
lw
a
y
o
f
e
lic
it
in
g
in
fo
rm
a
ti
o
n
T
o
w
n
s
e
n
d
e
t
a
l.
(2
0
1
6
),
W
a
d
m
a
n
e
t
a
l.
(2
0
1
7
)
O
rd
e
rs
o
f
a
p
p
ro
x
im
a
ti
o
n
T
h
e
s
im
p
le
s
t
s
e
q
u
e
n
c
e
is
a
“c
h
a
in
re
a
c
ti
o
n
”
–
e
a
c
h
e
v
e
n
t
d
e
p
e
n
d
s
o
n
ly
o
n
th
e
o
n
e
b
e
fo
re
.
B
u
t
th
in
g
s
c
a
n
b
e
m
o
re
c
o
m
p
lic
a
te
d
.
S
o
m
e
ti
m
e
s
e
a
c
h
e
v
e
n
t
d
e
p
e
n
d
s
o
n
th
e
p
a
rt
ic
u
la
r
c
o
m
b
in
a
ti
o
n
o
f
th
e
p
re
v
io
u
s
tw
o
p
re
v
io
u
s
e
v
e
n
ts
(o
r
th
e
p
re
v
io
u
s
th
re
e
,
a
n
d
s
o
o
n
).
T
h
e
s
e
d
if
fe
re
n
t
p
a
tt
e
rn
s
a
re
c
a
lle
d
“f
ir
s
t-
o
rd
e
r”
,
“s
e
c
o
n
d
-o
rd
e
r”
a
n
d
“t
h
ir
d
-o
rd
e
r”
s
e
q
u
e
n
c
e
s
,
re
s
p
e
c
ti
v
e
ly
.
A
n
d
th
e
lis
t
c
a
n
g
o
o
n
.
T
h
is
p
ro
p
e
rt
y
is
c
a
lle
d
th
e
o
rd
e
r
o
f
th
e
s
e
q
u
e
n
c
e
,
w
h
ic
h
is
a
c
o
n
fu
s
in
g
te
rm
,
a
s
“o
rd
e
r”
s
o
u
n
d
s
lik
e
a
n
o
th
e
r
w
o
rd
fo
r
“s
e
q
u
e
n
c
e
”.
It
m
a
y
h
e
lp
to
th
in
k
o
f
th
e
“o
rd
e
r”
o
f
a
s
e
q
u
e
n
c
e
a
s
m
e
a
n
in
g
it
s
“d
e
g
re
e
o
f
c
o
m
p
le
x
it
y
”
A
s
ta
ti
s
ti
c
a
ld
e
v
e
lo
p
m
e
n
t
o
f
s
ta
n
d
a
rd
B
S
A
in
w
h
ic
h
lo
n
g
e
r
p
re
d
ic
ti
v
e
c
h
a
in
s
c
a
n
b
e
m
a
d
e
.
H
a
s
s
im
ila
r
a
p
p
lic
a
ti
o
n
a
s
B
S
A
;
b
u
t,
w
it
h
lo
n
g
e
r
te
m
p
o
ra
lc
h
a
in
s
.
W
h
ile
th
is
s
e
e
m
s
a
g
o
o
d
a
p
p
ro
a
c
h
,
it
h
a
s
lim
it
a
ti
o
n
s
o
f
o
v
e
rf
it
ti
n
g
o
f
d
a
ta
a
n
d
h
e
n
c
e
w
h
y
la
g
-o
n
e
,
s
ta
n
d
a
rd
B
S
A
is
p
re
fe
rr
e
d
M
ill
e
r
a
n
d
S
e
lf
ri
d
g
e
(1
9
5
0
)
S
u
rv
iv
a
la
n
a
ly
s
is
T
h
is
m
e
th
o
d
is
u
s
e
d
to
a
n
a
ly
s
e
th
e
e
x
p
e
c
te
d
d
u
ra
ti
o
n
o
f
ti
m
e
u
n
ti
la
n
e
v
e
n
t
h
a
p
p
e
n
s
.
E
s
s
e
n
ti
a
lly
,
fr
o
m
a
g
iv
e
n
p
o
in
t
in
ti
m
e
,
h
o
w
lo
n
g
b
e
fo
re
w
e
s
e
e
a
n
e
v
e
n
t
o
c
c
u
r.
E
x
a
m
p
le
:
a
ft
e
r
a
h
o
m
ic
id
e
,
h
o
w
lo
n
g
u
n
ti
l
th
e
(s
e
ri
a
l)
k
ill
e
r
m
u
rd
e
rs
a
n
o
th
e
r
p
e
rs
o
n
?
T
h
is
m
e
th
o
d
s
h
o
w
s
th
e
ra
te
w
h
ic
h
e
v
e
n
ts
o
c
c
u
r.
It
c
a
n
b
e
u
s
e
d
to
s
h
o
w
d
if
fe
re
n
c
e
s
b
e
tw
e
e
n
g
ro
u
p
s
,
fo
r
e
x
a
m
p
le
,
d
o
s
e
x
u
a
lly
m
o
ti
v
a
te
d
b
u
rg
la
rs
re
-o
ff
e
n
d
m
o
re
q
u
ic
k
ly
th
a
n
fi
n
a
n
c
ia
lly
m
o
ti
v
a
te
d
b
u
rg
la
rs
.
O
r
d
o
y
o
u
n
g
e
r-
a
g
e
d
s
e
x
u
a
lo
ff
e
n
d
e
rs
re
-o
ff
e
n
d
m
o
re
q
u
ic
k
ly
th
a
n
o
ld
e
r-
a
g
e
s
o
ff
e
n
d
e
rs
a
ft
e
r
re
le
a
s
e
fr
o
m
p
ri
s
o
n
U
s
e
fu
lf
o
r
ri
s
k
a
s
s
e
s
s
m
e
n
t
(i
.e
.
h
o
w
lo
n
g
a
ft
e
r
a
th
re
a
t
o
r
p
ri
o
r
a
tt
a
c
k
b
e
fo
re
th
e
n
e
x
t
a
tt
a
c
k
ta
k
e
s
p
la
c
e
)
B
ri
ff
a
e
t
a
l.
(2
0
1
3
)
P
ro
x
im
it
y
c
o
e
ff
ic
ie
n
ts
A
fo
rm
o
f
s
e
q
u
e
n
c
e
a
n
a
ly
s
is
in
w
h
ic
h
p
ro
x
im
it
y
o
f
tw
o
b
e
h
a
v
io
u
rs
o
r
e
v
e
n
ts
is
m
e
a
s
u
re
d
.
P
a
rt
ic
u
la
rl
y
u
s
e
fu
l
fo
r
in
te
rr
o
g
a
ti
o
n
o
r
n
e
g
o
ti
a
ti
o
n
s
it
u
a
ti
o
n
s
,
in
w
h
ic
h
th
e
d
e
la
y
o
r
d
is
ta
n
c
e
b
e
tw
e
e
n
o
n
e
b
e
h
a
v
io
u
r
a
n
d
th
e
n
e
x
t
is
im
p
o
rt
a
n
t
to
k
n
o
w
U
s
e
fu
lf
o
r
in
te
rv
ie
w
/i
n
te
rr
o
g
a
ti
o
n
s
to
m
a
tc
h
v
e
rb
a
ls
ty
le
.
A
ls
o
u
s
e
fu
li
n
lin
g
u
is
ti
c
a
n
a
ly
s
e
s
fo
r
ti
m
e
b
e
tw
e
e
n
e
v
e
n
ts
C
o
rn
e
r
a
n
d
G
ill
(2
0
1
9
),
P
.J
.
T
a
y
lo
r
(2
0
0
6
)
(c
o
n
ti
n
u
e
d
)
PAGE 50j JOURNAL OF CRIMINAL PSYCHOLOGYjVOL. 10 NO. 2 2020
T
a
b
le
I
N
a
m
e
o
f
m
e
th
o
d
D
e
s
c
ri
p
ti
o
n
A
p
p
lic
a
ti
o
n
/E
x
a
m
p
le
R
e
fe
re
n
c
e
s
/A
u
th
o
rs
a
s
s
o
c
ia
te
d
B
e
h
a
v
io
u
r
tr
a
c
k
in
g
T
h
is
is
th
e
fi
rs
t
m
e
th
o
d
to
c
o
m
b
in
e
te
m
p
o
ra
la
n
a
ly
s
e
s
(B
S
A
)
w
it
h
g
e
o
g
ra
p
h
ic
p
ro
fi
lin
g
in
a
n
a
tt
e
m
p
t
to
s
h
o
w
th
e
lik
e
lih
o
o
d
o
f
b
e
h
a
v
io
u
rs
in
s
p
a
c
e
U
s
e
d
in
c
o
ld
c
a
s
e
s
to
m
a
p
p
o
s
s
ib
le
ro
u
te
s
ta
k
e
n
b
y
v
ic
ti
m
a
n
d
p
e
rp
e
tr
a
to
r.
E
s
p
e
c
ia
lly
u
s
e
fu
li
n
c
o
n
ju
n
c
ti
o
n
w
it
h
fo
re
c
a
s
ti
n
g
m
e
th
o
d
s
K
e
a
tl
e
y
e
t
a
l.
(2
0
1
9
)
B
e
h
a
v
io
u
ra
l
fi
n
g
e
rp
ri
n
ti
n
g
T
h
is
a
p
p
ro
a
c
h
b
u
ild
s
o
n
th
e
C
ri
m
e
L
in
k
a
g
e
re
s
e
a
rc
h
b
y
p
ro
v
id
in
g
a
w
a
y
o
f
m
e
a
s
u
ri
n
g
th
e
s
im
ila
ri
ty
b
e
tw
e
e
n
tw
o
b
e
h
a
v
io
u
ra
lc
h
a
in
s
.
F
o
r
e
x
a
m
p
le
,
if
3
w
o
m
e
n
a
re
fo
u
n
d
m
u
rd
e
re
d
,
in
v
e
s
ti
g
a
to
rs
m
a
y
w
o
n
d
e
r
w
h
e
th
e
r
th
e
y
a
re
lo
o
k
in
g
fo
r
1
,
2
,
o
r
3
k
ill
e
rs
.
If
w
e
lo
o
k
a
t
th
e
s
e
q
u
e
n
c
e
o
f
b
e
h
a
v
io
u
rs
in
e
a
c
h
c
a
s
e
,
w
e
c
a
n
th
e
n
s
e
e
w
h
e
th
e
r
th
e
b
e
h
a
v
io
u
ra
lf
in
g
e
rp
ri
n
ts
o
f
e
a
c
h
c
ri
m
e
s
c
e
n
e
m
a
tc
h
N
o
t
o
n
ly
fo
r
lin
k
in
g
s
u
s
p
e
c
te
d
s
e
ri
a
lk
ill
e
rs
,
b
u
t
c
a
n
a
ls
o
b
e
u
s
e
d
to
“f
in
d
”
s
im
ila
r
c
ri
m
e
s
a
llo
w
in
g
in
v
e
s
ti
g
a
ti
o
n
s
to
lo
o
k
a
t
th
o
s
e
c
ri
m
e
s
a
n
d
c
o
m
p
a
re
M
O
,
a
n
d
s
o
lv
a
b
ili
ty
fa
c
to
rs
.
T
h
is
m
e
th
o
d
a
ls
o
a
llo
w
s
ti
m
e
lin
e
s
d
e
v
e
lo
p
e
d
v
ia
in
te
rr
o
g
a
ti
o
n
to
b
e
c
o
m
p
a
re
d
to
k
n
o
w
n
fa
c
ts
to
h
ig
h
lig
h
t
d
if
fe
re
n
c
e
s
K
e
a
tl
e
y
a
n
d
C
la
rk
e
(2
0
1
8
)
T
im
e
s
e
ri
e
s
a
n
a
ly
s
is
T
h
is
a
p
p
ro
a
c
h
ta
k
e
s
c
o
n
ti
n
u
o
u
s
v
a
ri
a
b
le
s
(l
ik
e
a
g
ra
p
h
o
f
c
ri
m
e
ra
te
s
)
a
n
d
ta
k
e
s
th
e
s
e
ri
e
s
a
p
a
rt
th
e
w
a
v
e
s
in
to
c
y
c
le
s
.
It
p
u
lls
o
u
t
tr
e
n
d
s
in
th
e
c
o
n
ti
n
u
o
u
s
ly
fl
u
c
tu
a
ti
n
g
v
a
ri
a
b
le
s
M
o
re
u
s
e
fu
lf
o
r
c
o
m
p
a
ri
s
o
n
o
f
la
rg
e
r
d
a
ta
s
e
ts
o
f
lo
n
g
e
r
ti
m
e
lin
e
s
(i
.e
.
c
o
m
p
a
ri
n
g
h
o
w
m
a
n
y
m
u
rd
e
re
rs
h
a
d
ri
s
k
fa
c
to
r
“x
”
in
th
e
ir
c
h
ild
h
o
o
d
)
B
a
k
e
m
a
n
a
n
d
G
o
tt
m
a
n
(1
9
8
6
)
H
id
d
e
n
M
a
rk
o
v
m
o
d
e
lli
n
g
In
B
S
A
,
W
h
ile
w
e
m
a
y
o
b
s
e
rv
e
B
e
h
a
v
io
u
r
A
(t
a
lk
in
g
c
a
lm
ly
)
a
n
d
B
e
h
a
v
io
u
r
B
(s
m
ili
n
g
),
th
e
y
a
c
tu
a
lly
re
fl
e
c
t
a
n
u
n
d
e
rl
y
in
g
s
ta
te
(S
ta
te
1
:
p
e
rp
e
tr
a
to
r
c
a
lm
),
a
n
d
B
e
h
a
v
io
u
r
C
(s
h
o
u
ti
n
g
)
m
a
y
re
fl
e
c
t
a
d
if
fe
re
n
t
u
n
d
e
rl
y
in
g
s
ta
te
(S
ta
te
2
:
p
e
rp
e
tr
a
to
r
a
n
g
ry
).
W
h
e
re
a
s
A
a
n
d
B
m
a
y
c
h
a
n
g
e
(i
.e
.
th
e
o
b
s
e
rv
e
d
b
e
h
a
v
io
u
rs
m
a
y
b
e
d
if
fe
re
n
t,
s
u
c
h
a
s
D
–
la
u
g
h
in
g
)
th
e
u
n
d
e
rl
y
in
g
s
ta
te
m
a
y
re
m
a
in
th
e
s
a
m
e
.
S
im
ila
rl
y
,
B
e
h
a
v
io
u
r
D
(p
u
n
c
h
e
s
)
m
a
y
b
e
o
b
s
e
rv
e
d
fo
llo
w
in
g
A
a
n
d
B
;
b
u
t,
D
re
m
a
in
s
a
m
a
n
if
e
s
ta
ti
o
n
o
f
s
ta
te
2
(a
n
g
ry
)
U
s
e
fu
lf
o
r
u
n
d
e
rs
ta
n
d
in
g
u
n
d
e
rl
y
in
g
s
ta
te
s
;
h
o
w
e
v
e
r,
n
o
t
c
u
rr
e
n
tl
y
u
s
e
d
in
c
o
ld
c
a
s
e
in
v
e
s
ti
g
a
ti
o
n
s
.
M
o
re
d
a
ta
a
re
re
q
u
ir
e
d
a
n
d
th
e
“h
id
d
e
n
”
a
s
p
e
c
t
is
ty
p
ic
a
lly
o
ff
-
p
u
tt
in
g
to
in
v
e
s
ti
g
a
to
rs
E
d
d
y
(2
0
0
4
),
Z
u
c
c
h
in
ie
t
a
l.
(2
0
1
7
)
C
lu
s
te
re
d
B
S
A
A
n
a
ly
s
is
o
f
h
ig
h
e
r-
o
rd
e
r
s
e
q
u
e
n
c
e
s
s
e
e
m
s
to
re
q
u
ir
e
c
o
lo
s
s
a
ln
u
m
b
e
rs
o
f
d
a
ta
.
F
o
r
in
s
ta
n
c
e
,
a
s
e
q
u
e
n
c
e
w
it
h
2
5
k
in
d
s
o
f
e
v
e
n
ts
w
o
u
ld
n
e
e
d
a
ta
b
le
w
it
h
6
2
5
c
e
lls
fo
r
a
fi
rs
t-
o
rd
e
r
a
n
a
ly
s
is
,
b
u
t
1
5
,6
2
5
c
e
lls
fo
r
s
e
c
o
n
d
o
rd
e
r,
a
n
d
3
9
0
,6
2
5
c
e
lls
fo
r
th
ir
d
o
rd
e
r.
C
le
a
rl
y
,
a
“c
o
m
b
in
a
to
ri
a
le
x
p
lo
s
io
n
”
h
a
s
s
e
t
in
.
D
a
w
k
in
s
(1
9
7
6
)
s
o
lv
e
d
th
is
p
ro
b
le
m
w
it
h
a
c
le
v
e
r
m
e
th
o
d
th
a
t
fi
n
d
s
s
h
o
rt
c
h
a
in
s
fi
rs
t,
a
n
d
th
e
n
h
o
m
e
s
in
o
n
th
o
s
e
to
s
e
e
if
th
e
y
a
re
th
e
k
e
rn
e
lo
f
lo
n
g
e
r
c
h
a
in
s
–
a
b
it
lik
e
g
ro
w
in
g
a
c
ry
s
ta
lf
ro
m
a
s
m
a
ll
in
it
ia
l
“s
e
e
d
”.
B
e
c
a
u
s
e
th
e
s
e
a
rc
h
fo
r
p
a
tt
e
rn
s
is
s
o
s
e
le
c
ti
v
e
,
th
e
re
q
u
ir
e
m
e
n
t
fo
r
d
a
ta
o
n
ly
g
ro
w
s
g
ra
d
u
a
lly
a
s
lo
n
g
e
r
a
n
d
lo
n
g
e
r
c
h
a
in
s
a
re
c
o
n
s
id
e
re
d
,
a
n
d
th
e
d
e
te
c
ti
o
n
o
f
lo
n
g
-c
h
a
in
p
a
tt
e
rn
s
b
e
c
o
m
e
s
a
p
ra
c
ti
c
a
lp
o
s
s
ib
ili
ty
a
g
a
in
A
s
ta
ti
s
ti
c
a
ld
e
v
e
lo
p
m
e
n
t
o
f
th
e
B
S
A
a
p
p
ro
a
c
h
to
s
h
o
w
h
o
w
b
e
h
a
v
io
u
rs
c
lu
s
te
r
to
g
e
th
e
r
in
to
la
rg
e
r
s
e
q
u
e
n
c
e
s
D
a
w
k
in
s
(1
9
7
6
)
(c
o
n
ti
n
u
e
d
)
VOL. 10 NO. 2 2020 j JOURNAL OF CRIMINAL PSYCHOLOGYj PAGE 51
T
a
b
le
I
N
a
m
e
o
f
m
e
th
o
d
D
e
s
c
ri
p
ti
o
n
A
p
p
lic
a
ti
o
n
/E
x
a
m
p
le
R
e
fe
re
n
c
e
s
/A
u
th
o
rs
a
s
s
o
c
ia
te
d
C
ri
m
e
s
c
ri
p
t
a
n
a
ly
s
is
In
c
o
n
tr
a
s
t
to
B
S
A
,
th
is
is
a
to
p
-d
o
w
n
a
p
p
ro
a
c
h
b
a
s
e
d
o
n
p
s
y
c
h
o
lo
g
ic
a
l
s
c
ri
p
t
th
e
o
ri
e
s
.
T
h
is
a
p
p
ro
a
c
h
is
m
o
re
q
u
a
lit
a
ti
v
e
a
n
d
o
ft
e
n
e
a
s
ie
r
fo
r
p
ra
c
ti
ti
o
n
e
rs
to
u
n
d
e
rs
ta
n
d
a
s
it
d
o
e
s
n
o
t
n
e
e
d
s
ta
ti
s
ti
c
a
lt
e
c
h
n
iq
u
e
s
.
It
a
ls
o
w
o
rk
s
p
a
rt
ic
u
la
rl
y
w
e
ll
c
o
m
p
a
re
d
to
B
S
A
o
n
d
a
ta
o
r
c
a
s
e
s
w
h
e
re
n
o
t
a
ll
in
fo
rm
a
ti
o
n
is
k
n
o
w
n
.
It
w
o
rk
s
b
e
s
t
w
h
e
n
o
th
e
r
c
a
s
e
s
c
a
n
b
e
u
s
e
d
to
b
u
ild
a
“s
c
ri
p
t”
a
n
d
th
e
n
th
e
c
a
s
e
b
e
in
g
in
v
e
s
ti
g
a
te
d
c
a
n
b
e
c
o
m
p
a
re
d
to
th
o
s
e
s
c
ri
p
ts
/t
h
o
s
e
s
c
ri
p
ts
c
a
n
b
e
u
s
e
d
u
n
d
e
rs
ta
n
d
th
e
c
o
ld
c
a
s
e
A
s
o
u
tl
in
e
d
in
th
is
p
a
p
e
r,
u
s
e
fu
lf
o
r
c
a
s
e
s
in
w
h
ic
h
d
e
ta
ile
d
s
p
e
c
if
ic
in
fo
rm
a
ti
o
n
is
n
o
t
a
v
a
ila
b
le
.
It
p
ro
v
id
e
s
a
n
in
it
ia
lt
e
m
p
o
ra
la
p
p
ro
a
c
h
to
c
ri
m
e
in
v
e
s
ti
g
a
ti
o
n
s
.
It
a
ls
o
in
v
o
lv
e
s
p
o
lic
e
in
th
e
d
e
v
e
lo
p
m
e
n
t
o
f
ti
m
e
lin
e
c
h
a
in
s
,
w
h
ic
h
w
o
rk
s
a
s
a
u
s
e
fu
ls
ta
rt
in
g
p
o
in
t.
A
llo
w
s
re
s
e
a
rc
h
e
rs
to
b
u
ild
d
a
ta
b
a
s
e
s
o
f
C
S
A
c
h
a
in
s
B
e
a
u
re
g
a
rd
e
t
a
l.
(2
0
0
7
),
E
k
b
lo
m
a
n
d
G
ill
(2
0
1
6
),
H
o
m
e
le
t
a
l.
(2
0
1
4
),
K
e
a
tl
e
y
e
t
a
l.
(2
0
1
9
),
B
.
L
e
c
le
rc
a
n
d
W
o
rt
le
y
(2
0
1
4
),
B
e
n
o
it
L
e
c
le
rc
e
t
a
l.
(2
0
1
1
)
T
-p
a
tt
e
rn
a
n
a
ly
s
is
T
h
is
a
n
a
ly
s
is
a
llo
w
s
fo
r
m
u
lt
ip
le
c
o
n
c
u
rr
e
n
t
a
n
d
s
e
q
u
e
n
ti
a
l
b
e
h
a
v
io
u
rs
to
b
e
a
n
a
ly
s
e
d
a
c
ro
s
s
ti
m
e
.
T
h
e
p
a
tt
e
rn
s
(e
.g
.
X
Y
Z
)
c
a
n
b
e
a
n
a
ly
s
e
d
to
s
h
o
w
h
o
w
fr
e
q
u
e
n
tl
y
th
e
y
o
c
c
u
r
a
c
ro
s
s
ti
m
e
,
a
n
d
w
h
e
th
e
r
th
e
y
fo
rm
p
a
rt
o
f
a
la
rg
e
r
h
ie
ra
rc
h
y
o
f
s
e
q
u
e
n
c
e
s
(e
.g
.
(A
!
(X
Y
Z
))
).
T
-p
a
tt
e
rn
a
n
a
ly
s
is
c
a
n
fi
n
d
s
e
q
u
e
n
c
e
s
th
a
t
a
re
n
o
t
im
m
e
d
ia
te
ly
a
p
p
a
re
n
t
o
r
o
b
v
io
u
s
,
e
v
e
n
to
th
e
tr
a
in
e
d
e
y
e
–
e
s
p
e
c
ia
lly
in
c
a
s
e
s
w
h
e
re
s
e
q
u
e
n
c
e
p
a
tt
e
rn
s
a
re
s
p
re
a
d
o
v
e
r
ti
m
e
.
T
h
e
a
n
a
ly
s
is
d
o
e
s
le
a
d
to
c
o
m
p
le
x
o
u
tp
u
ts
;
h
o
w
e
v
e
r,
tr
a
in
e
d
e
x
p
e
rt
s
c
a
n
fa
c
ili
ta
te
u
n
d
e
rs
ta
n
d
in
g
th
ro
u
g
h
c
le
a
re
r
e
x
p
la
n
a
ti
o
n
s
th
a
n
th
e
c
o
m
p
u
te
ri
s
e
d
o
u
tp
u
t
c
u
rr
e
n
tl
y
g
iv
e
s
U
s
e
fu
lf
o
r
in
te
rr
o
g
a
ti
o
n
a
n
a
ly
s
e
s
.
W
h
ile
th
e
a
c
a
d
e
m
ic
lit
e
ra
tu
re
is
ty
p
ic
a
lly
u
n
fa
v
o
u
ra
b
le
to
d
e
c
e
p
ti
o
n
d
e
te
c
ti
o
n
,
th
e
a
b
ili
ty
to
c
o
m
b
in
e
v
e
rb
a
la
n
d
n
o
n
v
e
rb
a
l
c
u
e
s
is
u
s
e
fu
l
M
a
g
n
u
s
s
o
n
(2
0
0
0
),
M
a
g
n
u
s
s
o
n
e
t
a
l.
(2
0
1
6
)
In
d
ic
a
to
r
w
a
v
e
s
T
h
is
a
p
p
ro
a
c
h
a
ls
o
a
llo
w
s
m
u
lt
ip
le
c
o
n
c
u
rr
e
n
t
b
e
h
a
v
io
u
rs
a
n
d
e
v
e
n
ts
to
b
e
m
e
a
s
u
re
d
a
n
d
w
a
v
e
s
a
re
p
lo
tt
e
d
to
in
d
ic
a
te
w
h
e
n
a
fu
tu
re
b
e
h
a
v
io
u
r
m
a
y
o
c
c
u
r.
F
o
r
e
x
a
m
p
le
,
if
w
e
s
e
e
b
e
h
a
v
io
u
rs
x
,
y
a
n
d
z
o
c
c
u
rr
in
g
a
b
o
v
e
th
e
le
v
e
lw
e
w
o
u
ld
e
x
p
e
c
t
to
s
e
e
b
y
c
h
a
n
c
e
,
d
o
e
s
th
a
t
m
e
a
n
th
a
t
a
te
rr
o
ri
s
t
a
tt
a
c
k
is
im
m
in
e
n
t
o
r
s
ti
ll
m
a
n
y
m
o
n
th
s
a
w
a
y
A
m
o
re
u
s
e
r-
fr
ie
n
d
ly
v
e
rs
io
n
o
f
T
-P
a
tt
e
rn
A
n
a
ly
s
e
s
.
T
h
e
o
u
tc
o
m
e
s
a
re
m
u
lt
ip
le
w
a
v
e
s
.
M
o
re
u
s
e
fu
lf
o
r
m
u
lt
ip
le
c
a
s
e
s
(e
.g
.
lif
e
h
is
to
ry
a
n
a
ly
s
e
s
)
K
e
a
tl
e
y
a
n
d
C
la
rk
e
(2
0
1
8
)
T
e
m
p
o
ra
ln
e
tw
o
rk
a
n
a
ly
s
is
(S
o
c
ia
l)
n
e
tw
o
rk
a
n
a
ly
s
is
o
u
tl
in
e
s
th
e
re
la
ti
o
n
s
h
ip
b
e
tw
e
e
n
in
d
iv
id
u
a
ls
,
fo
r
in
s
ta
n
c
e
w
h
o
g
a
n
g
s
in
te
ra
c
t.
F
ro
m
th
e
s
e
n
e
tw
o
rk
s
,
h
ie
ra
rc
h
ie
s
o
f
c
o
n
tr
o
l
o
r
p
o
w
e
r
c
a
n
b
e
s
e
e
n
,
in
fl
u
e
n
c
e
c
a
n
b
e
n
o
te
d
.
T
h
is
is
e
x
tr
e
m
e
ly
im
p
o
rt
a
n
t
fo
r
in
v
e
s
ti
g
a
ti
o
n
s
;
h
o
w
e
v
e
r,
re
c
e
n
t
a
d
d
it
io
n
s
h
a
v
e
a
ls
o
b
e
g
u
n
to
m
a
p
h
o
w
th
e
s
e
n
e
tw
o
rk
s
g
ro
w
o
r
c
h
a
n
g
e
o
v
e
r
ti
m
e
.
T
h
e
te
m
p
o
ra
ln
e
tw
o
rk
a
n
a
ly
s
e
s
c
a
n
a
ls
o
b
e
u
s
e
d
to
s
h
o
w
h
o
w
c
o
-r
e
la
te
d
b
e
h
a
v
io
u
rs
a
t
th
e
s
c
e
n
e
o
f
a
c
ri
m
e
c
h
a
n
g
e
o
v
e
r
ti
m
e
(e
.g
.
if
g
u
n
s
a
n
d
g
a
g
s
a
re
u
s
e
d
in
e
a
rl
y
c
ri
m
e
s
,
d
o
e
s
th
is
c
h
a
n
g
e
to
k
n
iv
e
s
a
n
d
ta
p
e
la
te
r
o
n
,
o
r
is
th
e
n
e
tw
o
rk
m
o
re
in
tr
ic
a
te
ly
lin
k
e
d
)
T
h
e
b
a
s
is
o
f
th
is
h
a
s
b
e
e
n
u
s
e
d
to
s
h
o
w
th
e
re
la
ti
o
n
s
b
e
tw
e
e
n
p
e
o
p
le
in
c
a
s
e
s
.
C
o
ld
C
a
s
e
F
ile
s
a
re
fi
lle
d
w
it
h
n
a
m
e
s
(s
u
s
p
e
c
ts
,
w
it
n
e
s
s
e
s
,
re
la
ti
v
e
s
,
ti
p
-o
ff
s
,
e
tc
.)
.
T
h
e
re
a
re
ty
p
ic
a
lly
m
o
re
n
a
m
e
s
th
a
n
d
e
te
c
ti
v
e
s
c
a
n
k
e
e
p
tr
a
c
k
o
f,
s
o
p
ro
v
id
in
g
a
n
a
n
a
ly
s
is
o
f
th
o
s
e
n
a
m
e
s
a
n
d
lin
k
s
to
th
e
c
a
s
e
a
n
d
e
a
c
h
o
th
e
r
p
ro
v
id
e
s
a
h
e
lp
fu
l
o
v
e
rv
ie
w
.
G
ill
e
t
a
l.
(2
0
1
4
),
K
e
m
p
e
e
t
a
l.
(2
0
0
3
),
K
re
b
s
(2
0
0
2
)
(c
o
n
ti
n
u
e
d
)
PAGE 52j JOURNAL OF CRIMINAL PSYCHOLOGYjVOL. 10 NO. 2 2020
T
a
b
le
I
N
a
m
e
o
f
m
e
th
o
d
D
e
s
c
ri
p
ti
o
n
A
p
p
lic
a
ti
o
n
/E
x
a
m
p
le
R
e
fe
re
n
c
e
s
/A
u
th
o
rs
a
s
s
o
c
ia
te
d
M
a
tr
ix
fo
re
c
a
s
ti
n
g
-B
S
A
T
h
is
c
o
m
b
in
e
d
a
p
p
ro
a
c
h
o
f
m
a
tr
ix
fo
re
c
a
s
ti
n
g
a
n
d
B
S
A
h
a
s
b
e
e
n
u
s
e
d
o
n
c
o
ld
c
a
s
e
s
to
p
ro
v
id
e
a
s
u
m
m
a
ry
o
v
e
rv
ie
w
o
f
th
e
c
a
s
e
p
ro
g
re
s
s
io
n
.
In
p
a
rt
ic
u
la
r,
th
e
m
a
tr
ix
fo
re
c
a
s
ti
n
g
o
u
tl
in
e
s
d
e
te
c
ti
v
e
s
’
ju
d
g
e
m
e
n
ts
a
n
d
in
v
e
s
ti
g
a
ti
v
e
a
p
p
ro
a
c
h
e
s
,
w
h
ic
h
a
re
m
a
d
e
a
b
o
u
t
b
e
h
a
v
io
u
rs
a
n
d
e
v
e
n
ts
a
c
ro
s
s
th
e
ti
m
e
lin
e
,
o
u
tl
in
e
d
in
B
S
A
.
T
h
e
c
o
m
b
in
a
ti
o
n
o
f
th
e
s
e
m
e
th
o
d
s
a
llo
w
s
a
s
tr
u
c
tu
re
d
ti
m
e
lin
e
o
f
in
v
e
s
ti
g
a
ti
v
e
le
a
d
s
to
…
Matrix Forecasting and Behaviour Sequence Analysis: Part
of the Timeline Toolkit for Criminal Investigation
D. A. Keatley1,2 & D. D. Clarke1,3
# Society for Police and Criminal Psychology 2020
Abstract
Solving serious crimes such as sexual assault, rape, and murder takes a considerable amount of investigation time. Despite efforts,
many crimes may be unsolved, and go ‘cold’. These cases are typically extensive and reviewing the material can be prohibitively
time consuming. The current manuscript proposes the combination of two methods, or ‘tools’, for timeline analyses: Matrix
Forecasting and Behaviour Sequence Analysis (BSA). Matrix Forecasting provides a clear and comprehensive approach to
outlining predictions investigators make, the rationale underlying these predictions, the accuracy, and the evidence. Matrix
Forecasting also outlines areas for future investigation, for example, if new technology becomes available or new test results
are returned. The BSA provides a statistical, visual pathway map that outlines the proposed or proven steps in a crime. The
combination of these methods provides a new approach to mapping criminal investigations and has been effectively used in
several real-world cold case reviews. To illustrate the benefits of this combined approach, a real-world example, the Jeffrey
MacDonald, aka Green Beret Killer case, will be analysed using Matrix Forecasting and BSA to show the benefits of the method
in terms of providing a quick-guide for future review and solvability factors.
Keywords Matrix forecasting . Behaviour sequence analysis . Cold case . Criminal investigation
A person is murdered. The investigation into this most serious
of crimes is intense and dedicated. To begin, a number of
criminological and forensic approaches are taken. Suspect
lists are developed and interviews begin in earnest. Not for
lack of person-power, time, or effort, the investigation loses
momentum in terms of fresh leads and new hopes for solv-
ability. Eventually, the case is labelled ‘cold’ and relegated to
the area of police investigation that typically slips from most
people’s collective conscience—most, except the families in-
volved and Detectives still working tirelessly to solve it. It is at
this stage that the likelihood of solving the case reduces rap-
idly. Resources are allocated to other cases, and potential for
new leads reduces as time moves forward. Every few years,
with the changing of Detectives, or from external pressures,
new reviews of cold cases may be undertaken. One of the
difficulties with each new review is effective time manage-
ment. Many Detectives prefer to use a grounded or bottom-up
approach, starting at the beginning and working forwards
through the case for themselves. This provides the opportunity
to re-analyse and examine every piece of evidence; however,
in cases spanning multiple decades, it can prove prohibitively
time consuming—in the case presented here, it would include
the reading of tens of thousands of pages of documents. It can
also lead to Detectives focusing on early suspect lists only to
later realise that the suspect was cleared. Clearly, a better
method or toolkit is needed to help solve these cases, and that
is what is outlined here.
To expedite the review process, many Detectives prefer to
give a summary, an ‘Executive Report’, at the beginning of
their case files. This report outlines the main progression of
the case and serves as a reminder for the Detective, who may
have to work other cases for a prolonged period, as well as
offering new Detectives or outside assistance a quick over-
view of the case. While a helpful resource, these reports can
suffer from various biases or heuristic reasoning (Nisbett and
Ross 1980; Sniezek and Henry 1989), which may unintention-
ally misguide future investigation attempts. These reports also
do not always outline the full extent of the investigation in
* D. A. Keatley
[email protected]
1 Researchers in Behavior Sequence Analysis (ReBSA),
Nottingham, UK
2 School of Law, Murdoch University, Perth 6150, Australia
3 School of Psychology, University of Nottingham, NG72RD,
Nottingham, UK
Journal of Police and Criminal Psychology
https://doi.org/10.1007/s11896-020-09367-1
http://crossmark.crossref.org/dialog/?doi=10.1007/s11896-020-09367-1&domain=pdf
http://orcid.org/0000-0002-6601-1939
mailto:[email protected]
terms of all the avenues explored and all the potential possi-
bilities for further investigation. Indeed several authors have
highlighted the risks of biases in criminal investigation cases
(Chapman et al. 2019; Roach 2019). The difficulty is that
many detectives may remain sceptical of the applied validity
of academic research, preferring to rely on their experience or
‘gut instinct’ as a means of progressing in a case, such confir-
mation bias is particularly problematic in cold cases, wherein
later investigators may be more likely to agree with and sup-
port prior investigators’ decisions and conclusions rather than
derive new ones (Roach 2019).
Police investigations are open to cognitive biases, such as
heuristics (Chapman et al. 2019, Goldsmith 2001). Many
Cold Case Task Force and major police investigations use a
paramilitary, rank-style structure (Chapman et al. 2019), in
which final decision making comes down to a Senior
Investigating Officer (in the UK). In Task Forces in USA,
Detectives may be the sole investigating officer, thus making
all of their own decisions, or take direction from their Chiefs.
This structure of investigations means decision making plays
a large role and therefore biases in decision making can affect
outcomes of cases. Many officers adopt a blue ‘curtain of
silence’ (Chapman et al. 2019) meaning that awareness of
improprieties are often left hidden or undiscovered until re-
view (Goldsmith 2001). Clearly, scientific labs and studies are
not free from biases either; however, researchers are often
more aware of these biases and the move towards
preregistered reporting shows a conscious effort to improve
the scientific practice more generally. A method that makes
police more aware of these biases in their investigation pro-
cess is more likely to lead to better, more well-informed deci-
sion making (Chapman et al. 2019). The Matrix
Forecast outlined in the current paper has a column
asking investigators to list biases that may affect their
decisions and thinking, which can then be independently
reviewed if needed.
Traditional academic approaches to Forensic Psychology
and Criminology typically take a statistical approach (using
regression analyses for example) or qualitative means (e.g.
thematic or interpretative phenomenological analysis). These
methods are useful for understanding the effect of individual
risk factors on ‘predicting’ outcome behaviours, as is the case
with regression model approaches. They may also provide key
insight into the themes or intra-personal views of victims and
criminals, as is the case with qualitative methods. However,
these methods typically lack ability to account for complex,
temporal chains of behaviours that evolve over time.
Regression models, for example, can take multiple predictor
variables (e.g. age, gender, personality, motivation) to predict
an outcome (e.g. crime); however, regression analysis reduces
complex outcomes to a single behaviour, omitting whether
other behaviours and events affect the outcome. More com-
plex statistical models exist (such as hierarchical modelling
etc.); however, these methods quickly become unintelligible
to police investigation, and still cannot easily be used to cal-
culate longitudinal complex dynamics (Keatley 2018).
Qualitative methods, in contrast, allow for in-depth under-
standing of behaviours, but are harder or impossible to quan-
tify in a meaningful way, and often end in reports that are
almost as long as the base material in the investigation.
What is required is a method that allows a comprehensive
executive summary of the main findings in the case, as well as
which pathways have been explored, and which remain open
to future investigation (perhaps in the advent of new technol-
ogy or evidence being found), and finally, a method that forces
investigators to confront and explicitly label their potential for
biases. The focus of the current paper is to outline a novel
approach currently being used on several current and cold case
investigations. The approach merges two existing methods:
Matrix Forecasting (Clarke 1992, 2004) and Behaviour
Sequence Analysis (Keatley 2018) to provide investigators
with a new approach for their cases. While there is a growing
body of research on BSA, there is much less recent research
on the type of matrix forecasting, Seven-Column Forecasting,
presented in this paper. Each method will be outlined and then
a real-world case will be presented to show how the combined
approaches of forecasting and sequencing can be used in on-
going police investigations. This is the first article, to the au-
thors’ knowledge to tentatively combine these methods, and is
presented as a novel area for research with the aim of being
qualified and developed by researchers in the area, alongside
police investigations as well as on cold cases available for
general research practice (such as the one used as an example
in this paper).
Matrix Forecasting
The ability to accurately predict or forecast future events is
clearly beneficial in a wide range of disciplines and applied
fields. Many researchers have developed multiple methods for
improving human judgements and forecasting accuracy
(Makridakis 1994); however, most humans and computer
programmes remain relatively inaccurate at predicting future
events (Clarke 1992; Makridakis and Hibon 2000). A large
reason for the inaccuracies of human judgement is an individ-
ual’s inability to correctly assess their own biases and adjust
further judgements based on that (self-) awareness or group
biases (Budowle et al. 2009; Cooper and Meterko 2019;
Sniezek 1992; Sniezek and Henry 1989). This is typically
further complicated by complexity of measuring and mapping
temporal, dynamic behaviours (Keatley 2018). Typically,
when a forecast is made by a practitioner or researcher, the
accuracy is recorded, and the next prediction may be about
another behaviour or event entirely. Research using regression
models suffer this type of issue. To improve this area, a
J Police Crim Psych
method was developed to help improve human judgement and
forecasting accuracy: Matrix Forecasting (MF; Clarke 2004).
Quantitative forecasting methods use increasingly complex
computer algorithms and artificial intelligence operations to
predict future events (Geurts, Box, and Jenkins 1977;
Seymour, Brockwell, and Davis 1997). However, such
methods typically require larger datasets structured in a way
that is not practical or possible in criminal (cold) case investi-
gations. Also, many police officers are sceptical of using com-
puter programmes or ‘black box’ approaches to solving crime,
which they do not fully understand or feel able to defend if
called upon in court. Therefore, a method that helps improve
officers’ forecasting accuracy and ability to move forward and
apply the same principles in similar crimes is practical and
clearly beneficial. Many individuals, guided by television rep-
resentations of investigations, may believe that all police have
access to large databases of data, and while it is true that police
can access such databases, the reality is that they are often
facing a large backlog of requests and cold cases are seldom
prioritised. Therefore, while these databases may prove useful
for some investigations, for older cold cases, they are either
not readily accessible or the lack of information in the cold
case means that the database is not useful.
The method proposed here is a qualitative approach that
has similar logic to that of machine learning, more specifically
‘genetic algorithms’ (Forsyth 1989). These genetic algorithms
are rule-inducing programmes that borrow Darwinian evolu-
tion principles to constantly improve the accuracy of predic-
tions. Rules are created and evaluated, and those that do not
lead to improved forecasting are abandoned, while the better
ones are retained. Rules can then be developed (‘bred’ or
‘mutated’ in evolutionary terms) to offer further rules for evo-
lutionary testing. Matrix Forecasting uses the same principle
in refining and improving judgement forecasts. Furthermore,
Matrix Forecasting does not require expensive programmes or
machines and can be run in cold case task forces to assist with
investigations. It may be that after completing the Matrix
Forecast, new potential leads are highlighted, which detectives
can then forward to machine databases, rather than attempting
to scan old hand-written or typed pages and then forward these
in some meaningful format.
Matrix forecasting (MF; Clarke 1992) is designed for use
with a group of experts, such as Cold Case Detectives. Experts
consider a structured series of events and progress step-by-
step to forecast future behaviours or events in the timeline.
Effectively, they forecast what happened next. The first col-
umn in Matrix Forecasting is the first step in the process, in
which an individual makes an ad hoc prediction of the next
event. Then, the expert is asked to provide a rationale for why
they made this prediction, this is important in order to under-
stand the possible inferences or biases being made (perhaps
the detective is drawing from similar past cases etc.). Step 3 is
to provide a summary of the real next event as it becomes
known. Following this, a quantitative estimate or accuracy
in Step 4 is provided for the match or mismatch between steps
1 and 3 (i.e. how accurate was the ad hoc prediction compared
with reality). Step 5 requires a more qualitative summary of
the nature of the discrepancy (was it entirely inaccurate or
wrong-by-degrees). Following this, experts are asked to con-
sider what changes would be required to their predictive strat-
egy (steps 1 and 2) in order to prevent such errors (shown in
step 5) from occurring again. Finally, step 7 is a cumulative list
of predictive guidelines based on step 6 that should be taken
forward for future forecasts. These columns can be reduced or
elaborated as seen fit by the investigators.
While the MF approach has proved useful for improving
judgements of future events, it has needed to be developed to
make it more applied for cold cases. In terms of cold cases,
Detectives are more interested in agreement between investiga-
tors, routes for further investigation, and possible leads. These
have been taken into account in the approach presented in this
paper (see Fig. 1). While the MF provides an in-depth, infor-
mative approach to the decision-making process and offers
greater insight for future investigation, it leads to complex ma-
trices being formed that may be harder to follow for new de-
tectives. The MF approach may also lose or obfuscate some of
the timeline that is important to understand in criminal investi-
gations. A method is required, therefore, that outlines clearly
and succinctly the temporal progression of behaviours. Such a
method exists and has been widely used in Forensic and
Criminological areas: Behaviour Sequence Analysis (Ivanouw
2007; Keatley 2018; Keatley, Barsky, and Clarke 2017).
Behaviour Sequence Analysis
Understanding the temporal dynamics of a crime has obvious
benefits for investigations. Detectives can piece together the
likely progression of events and begin to form an overview of
the crime commission. This temporal outline allows detectives
to consider discrepancies between crime scenes so that they
may consider whether the current crime is unique and distinct,
or forms part of a series (Keatley and Clarke 2019). One
leading method for statistically analysing and providing flow
diagrams of behavioural chains is Behaviour Sequence
Analysis (BSA; Keatley 2018). Temporal Analysis has been
applied across a wide range of crimes, including burglary and
theft (Homel, Macintyre, and Wortley 2014); violence (Taylor,
Keatley, and Clarke 2017); sexual assault and rape (Ellis,
Clarke, and Keatley 2017; Fossi, Clarke, and Lawrence
2005); and serial homicide (Keatley, Golightly, Shephard,
Yaksic, and Reid 2018). The output of BSA is a flow diagram
(called a State Transition Diagram) that shows how one be-
haviour follows another, creating lengthier sequences of steps
in a crime. Although underpinned by statistics, diagrams can
be interpreted without any further statistical understanding.
J Police Crim Psych
The method of BSA requires three stages. First, a crime
episode is parsed into separate, distinct behaviours. These
behaviours are then categorised so that similar types of be-
haviours across different crime scenes can be compared. For
example, if we see ‘stabbed’ in crime 1, and ‘knife penetra-
tion’ in crime 2, we may consider these Behaviour type ‘A’
(although we should check with Detectives, autopsy and
Medical Examiners, if possible, to ensure that the two types
of injuries are commensurate). This categorisation process is
repeated across the entire episode, or multiple episodes, until
every behaviour has been given an agreed category label.1
This typically produces chains of code, which stand for be-
haviours: A➔B➔C➔D…n (where each letter refers to a be-
haviour type category until the crime episode ends, n). The
final stage of BSA is the analysis, wherein the transitions
between behaviour pairs are analysed. Therefore, whereas
the crime episode gives a chain ‘A➔B➔C➔D’, the lag-one
sequence analysis focuses on transitions between pairs of be-
haviours (A➔B, B➔C, C➔D etc.). More complicated forms
of BSA exist allowing for longer chains to be analysed (e.g.
[AB]➔C, [BC]➔D); however, there are various reasons why
these higher-order BSA approaches are not favourable in re-
search or application (See Keatley 2018 for a review).
A strength of the BSA approach is that it shows the chain of
behaviours as they fit together across a crime, and/or multiple
crimes. This allows investigators to begin to see patterns emerg-
ing, and most recently, researchers have developed a method for
linking crimes using BSA, known as Behaviour Fingerprinting
(Keatley and Clarke, 2019), as well as using BSA to predict
geographic movements, known as Behaviour Tracking
(Keatley et al., 2018). Both Behaviour Fingerprinting and
Tracking methods are useful alongside the Matrix Forecasting
approach. Clearly, BSA works best with multiple cases or for
collating multiple investigators’ views, in which common path-
ways can be detected and analysed. But, cold cases are typically
single-homicides, without others in a series to link to.
Furthermore, BSA works best when all behaviours in a se-
quence are known and can be mapped clearly, which is
obviously not the case in many cold cases, where missing or
unknown information is typically a cause of the case going
cold. Therefore, BSA needs to be developed to better handle
single cases, with missing segments of the episode, which is
where predictions of future behaviours in the sequence are crit-
ical. Combining matrix forecasting with BSA is a parsimoni-
ous, effective means of moving both methods forward for
investigations.
Combining the Methods
Combining MF with BSA has proved useful in a number of
real-world cold cases the authors are currently actively in-
volved in; however, as on-going cases, these are currently
not open to publication. To show the benefits of a timeline
toolkit approach combining MF and BSA, an open-access
case will first be outlined, and then analysed using the novel
approach. The Jeffrey Macdonald ‘Green Beret Killer’ case
will be used to show how MF and BSA could have been used
to assist with investigation process and follow-up case re-
views.2 A full portrayal of the case spans around 10,000 pages
of court and investigative documents, and 3 books (totaling
around 2000 pages)—clearly beyond the scope of the present
article. Therefore, a brief summary of the case as it first be-
came known to investigators responding to the scene is given
below. For ease of comprehension, the details of the case as
they became known have been re-written into a clearer se-
quence (obviously, in real cases some parts are not so imme-
diately apparent).
Dispatchers at Fort Bragg receive an emergency call at
0342, on February 17th, 1970. Jeffrey Macdonald re-
ports a “stabbing”. First responders arrive on scene
and are confronted by the bodies of Colette (wife),
Kristen (Daughter), and Kimberly (Daughter), all are
found dead in their bedrooms. Jeffrey was located next
1 Best practice is to seek agreement between multiple coders and experts
involved in the case.
2 We appreciate that the case is now legally ‘solved’ and no longer cold;
however, it took 9 years before a conviction was made, and so for the purposes
of this paper it stands as a useful example.
1. Prediction 2. Rationale 3. Degree of
certainty
4. number of other
routes
5. Discrepancy
between routes
6. Number of
investigative leads
7. Actual outcome
if known (and
continue with 7
column if so)
Awoken by
intruders
Suspect statement 75 (only available
evidence at present)
N=3
1 Wholly different
suspects
Forensic test for
intruders
For future follow-
up
Wakes up (no
intruders)
High percentage of
familicide cases
25 (based solely on
experience /bias)
N=1
1
Note. N = number of investigators who agree on this transition being the most likely next step.
Fig. 1 Matrix Forecast for start node. N = number of investigators who agree on this transition being the most likely next step
J Police Crim Psych
to his wife, alive but bleeding, on the floor of their bed-
room. Colette and the daughters had all been viciously
attacked (blunt force trauma and multiple stab
wounds3). Jeffrey was bleeding from the abdomen area,
and immediately taken to hospital.
When first-responders arrived, Jeffrey claimed (and still
does) that he had fallen asleep in the living room, to be
awoken to the sounds of his wife, Colette screaming.
Stood over him, as he awoke, were 4 intruders (3 men,
and a woman). He described the woman as wearing a
floppy white hat and a blonde wig, and said she was
holding a flickering light (like a candle) and chanting
“Acid is groovy, kill the pigs”. The 3 men then attacked
Jeffrey with a club and he felt something sharp in his
chest/abdomen. He passed out and when he awoke he
checked on the state of his family – to find them all dead.
He then phoned the base CID to raise help.
The CID, after investigation, held a different view – that
Jeffrey himself, alone had viciously attacked and mur-
dered his wife and children, and then staged the scene
and his own injuries to fit his narrative.
This was the information given to investigators first arriv-
ing at the scene and interviewing Jeffrey MacDonald at the
hospital. Given the open-access of Fort Bragg, closing down
the base was not quickly and effectively possible. Of impor-
tance, a female matching the description that Jeffrey had given
was seen in the area by a responding officer. The aim here is
not to get into the prolonged legal aspects of the case, which
have spanned multiple decades. Instead, the next step is to
show how a combination of forecasting and BSA could have
been used in the investigative process.
In the case of Jeffrey MacDonald, the process would begin
by establishing each Detectives perceived timeline of events.
This is best done in isolation, so that each Detectives timeline
is not biased or influenced by others. The coding process is
then very similar to standard BSA. Timelines are first parsed
into discrete behaviours and events, then categorised such that
all Detectives’ accounts can be cross-examined. Finally, anal-
yses can be conducted on the sequences to show behavioural
chains. For the current case, many Detectives may believe
MacDonald and put his being knocked unconscious very soon
after been awoken. Others, however, may be suspicious of the
events as told by MacDonald, and consider alternative time-
lines entirely, for example: Jeffrey is on sofa ➔ Jeffrey goes to
his bedroom ➔ Jeffrey assaults Colette.
The state transition diagrams provide a clear and informa-
tive way of showing the most likely timelines, as perceived by
detectives. These timelines could be assessed for consistency
(Abbott and Hrycak 1990; Rosenbaum 1989) or Behavioural
Fingerprints (Keatley and Clarke 2019), which is a more so-
phisticated method of analysing similarity between sequential
timelines. The major benefit of combining BSA with MF,
however, is to take the state transition diagram a step further
and break-down the decision-making process for each transi-
tion in the chain. This clarifies reasoning and biases, and high-
lights opportunities for future investigation. This process al-
lows clear mapping of the investigative process for future
investigators if the case goes cold. In the current case, the
starting point of the sequence can be put into the matrix to
clarify why different starting positions have occurred (see Fig.
2).
Clearly, there are two proposed starting points to this se-
quence of events, depending on whether we believe Jeffrey’s
account or not. Each has a very different ramification in terms
of proposed suspect(s). While the state transition diagram pro-
vides a very quick overview of the possible pathways (see
Keatley 2018 for overview), the matrix provides more in-
depth detail of how each node and transition were decided.
Future investigations may look to this to decide whether new
tests have become available (i.e. M-VAC), or whether all leads
have been investigated. Use of dates in column 7 allows in-
vestigators to keep a track of when testing has been conducted.
Again, the columns can be developed to suit the investigators
needs; but over several cases, the 7 presented here provide the
most parsimonious starting point for building a Matrix
Forecasting approach, and fits most closely with published
examples (Clarke 1992). These columns for further testing
are what may also prompt Detectives to begin a targeted vet-
ting of computer databases to answer specific questions, thus
expediting the process.
As is typical in the early stages of investigations, multiple
Detectives will have competing and divergent views, a pro-
cess that is helpful for the investigation, but can lead to con-
fusion of facts and uncertainty of leads. Combining MF with
BSA offers a way of bringing-together multiple views and
theories and documenting them in a way that current and
future investigators (if the case goes cold) can review and
update accordingly, if new technology, testing, or testimony
becomes known. Figure 2 outlines how matrix forecasting and
BSA can be combined to show the possible chains of behav-
iours, underlying rationales for pathways, and areas for future
investigation.
Behaviour Tracking
Another timeline tool that is useful for investigations and can be
used as part of the proposed approach is Behaviour Tracking
(Keatley et al., 2019), which can be used to show pathways of
movements around the home or other geo-spatial areas. These
perceived geo-temporal movements can then be compared with
known blood stains and forensic evidence in attempts to sup-
port or refute them. One of the key areas of initial investigation
in the MacDonald case was the blood stains around the prop-
erty. Owing to the fact that each member of the MacDonald
J Police Crim Psych
family had a different blood type (Colette: Type A; Jeffrey:
Type B; Kimberly: Type AB; Kristen: Type O), the prosecution
soon drew a proposed route that Jeffrey walked and the order in
which he killed his family (the arrows in Fig. 3). Figure 3 pro-
vides a simplified version of the prosecution’s proposed se-
quence of movements. In active investigations or cold cases,
the Behaviour Tracking approach could be used to show mul-
tiple different possible pathways (derived from investigators’
proposed sequence of movements, and supported by evidence
where possible). Behaviour Tracking can show transitions
agreed by the majority of investigators (shown as line thick-
ness); it can also be a useful pictorial display of different spatio-
temporal movements, which can focus testing of evidence to
remove or support particular routes.
The Combined Approach and Solvability
In an ideal world, all crimes would be given the maximum
amount of time needed to investigate and solve; however,
Police Departments are typically overworked and under-staffed,
so a system for prioritizing solvability of cases is needed. A
further benefit of the current combined approach is to use it as
a method of solvability scaling. Within Cold Case investigation
teams, a major hurdle before investigating a case is knowing
which cases to prioritise. It is not always clear or easy to know
which cases are more likely to be solved, without full and exten-
sive reviews. Currently, a number of Law Enforcement
Organisations around the world have developed their own metric
system for rating solvability of cases (typically relating to avail-
ability of evidence, witnesses, and time-since-crime). The new
approach outlined here could be used to show how many possi-
ble leads remain in a case, in a quick and clear way. The sequence
chains and matrices …
Full Terms & Conditions of access and use can be found at
https://www.tandfonline.com/action/journalInformation?journalCode=udbh20
Deviant Behavior
ISSN: 0163-9625 (Print) 1521-0456 (Online) Journal homepage: https://www.tandfonline.com/loi/udbh20
Understanding School Shootings with Crime Script
Analysis
David A. Keatley, Sian Mcgurk & Clare S. Allely
To cite this article: David A. Keatley, Sian Mcgurk & Clare S. Allely (2019): Understanding School
Shootings with Crime Script Analysis, Deviant Behavior, DOI: 10.1080/01639625.2019.1596543
To link to this article: https://doi.org/10.1080/01639625.2019.1596543
Published online: 29 Mar 2019.
Submit your article to this journal
Article views: 372
View related articles
View Crossmark data
https://www.tandfonline.com/action/journalInformation?journalCode=udbh20
https://www.tandfonline.com/loi/udbh20
https://www.tandfonline.com/action/showCitFormats?doi=10.1080/01639625.2019.1596543
https://doi.org/10.1080/01639625.2019.1596543
https://www.tandfonline.com/action/authorSubmission?journalCode=udbh20&show=instructions
https://www.tandfonline.com/action/authorSubmission?journalCode=udbh20&show=instructions
https://www.tandfonline.com/doi/mlt/10.1080/01639625.2019.1596543
https://www.tandfonline.com/doi/mlt/10.1080/01639625.2019.1596543
http://crossmark.crossref.org/dialog/?doi=10.1080/01639625.2019.1596543&domain=pdf&date_stamp=2019-03-29
http://crossmark.crossref.org/dialog/?doi=10.1080/01639625.2019.1596543&domain=pdf&date_stamp=2019-03-29
Understanding School Shootings with Crime Script Analysis
David A. Keatleya, Sian Mcgurkb, and Clare S. Allelyc
aMurdoch University, Perth, Australia; bUniversity of Lincoln, Lincoln, UK; cUniversity of Salford, Manchester, UK
ABSTRACT
Mapping the antecedents of school shootings is an important step towards
understanding and predicting when the tragedies occur. This study uses
Crime Script Analysis (CSA) to map the variety of behaviors and precursors
in sequence. An in-depth analysis of 16 school shooters in the United States
of America was used to build a crime script. The results showed five key
scenes through which school shooters progressed in the lead-up to their
school shootings. The approach is the first to provide a temporal account of
school shooters planning of their crimes and forms the foundation for
future school shootings to be added to. This research also shows how
a CSA approach can be used to generate crime prevention strategies for
future school shootings.
ARTICLE HISTORY
Received 28 March 2018
Accepted 8 August 2018
It used to be the case that parents could send their children to school without fear for the children’s
lives. Publicity surrounding recent events in America have raised awareness and concerns about the
safety of children in high schools (Abouk and Adams 2013; Rocque 2012). While school shootings
are not a new phenomenon, there remains uncertainty about the antecedents of these tragedies
(Gerard et al. 2016; Meloy et al. 2001). Multiple risk factors have been identified in the literature,
such as exclusion and isolation, bullying, and revenge motivations (Langman 2013; Leary et al. 2003).
However, individual risk factors studied and presented alone do not provide a dynamic account of
how individuals prepare for and execute their plans.
There was a sudden growth in research on school shootings in the 1990s, following the events at
Columbine High School, Thurston High School, and Westside Middle School, as well as others (Baird,
Roellke, and Zeifman 2017). Despite an increased focus on research into school shootings there remains
a lack of clear understanding about what causes these events, and how to predict them. Some general
trends have been shown, relating to economic status, ethnicity, and interpersonal disputes (Wike and
Fraser 2009). General school violence is likely to be committed by low-income, ethnic minorities in
urban school environments (Wike and Fraser 2009); school shootings, however, are more likely to be
committed by white, middle-class students (Baird, Roellke, and Zeifman 2017). While general trends
may provide the basis of understanding social processes and indicators of future violence, they do not
offer specific accounts of the temporal dynamics preceding a school shooting.
Some of the most extensive and well-cited studies of school shootings include one which was
conducted by the Federal Bureau of Investigation (FBI; O’Toole 2000) and another conducted by the
United States Secret Service and the United States Department of Education (Vossekuil et al. 2002).
Borum et al. (2010) have highlighted that one of the things that makes these studies notable is that
they both rejected efforts to develop a profile of the individual who perpetrates a school shooting.
They also both discouraged the use of lists of warning signs or “checklists” as they are too simplistic.
Instead, the focus should be shifted towards “threat assessment as a prevention strategy” (Borum
et al. 2010). In the FBI study, a review was carried out of 14 cases of actual shootings and also four
cases of planned shootings that were thwarted (O’Toole 2000). O’Toole identified 47 descriptors that
CONTACT David A. Keatley [email protected] School of Law, Murdoch University, Perth 6150, Australia
© 2019 Taylor & Francis Group, LLC
DEVIANT BEHAVIOR
https://doi.org/10.1080/01639625.2019.1596543
https://crossmark.crossref.org/dialog/?doi=10.1080/01639625.2019.1596543&domain=pdf&date_stamp=2019-03-29
were common across many shooters. Some of these common descriptors including 28 personality
traits and behaviors, seven family dynamics, seven school dynamics, and five social dynamics. It was
highlighted by O’Toole (2000) that not all the shooters had each of these features, but the identified
dynamics were seen as constituting significant trends. Some of the common individual features
included narcissism (which is consistent with a number of studies, e.g., Bondü and Scheithauer
2015), bigotry, alienation, poor anger management, a fascination with violence, low levels of self-
esteem and a lack of empathy.
The FBI study (O’Toole 2000) was based on a five-day conference, which was attended by 160
invited experts and professionals in law enforcement, education, and mental health. The conference
also included school staff members who had experienced a school shooting first-hand. The 160
delegates collectively assessed 18 completed or thwarted school shooting cases. The FBI experts in
criminal profiling argued that profiling was an inappropriate method for the prevention of school
shootings. It was unequivocally agreed that there exists no single set of characteristics that could
define a would-be school shooter with sufficient levels of specificity to make it of practical value.
They argued that the development of a “checklist” of warning signs to identify a would-be school
shooter can be short-sighted and potentially dangerous. It is possible that some students who have
no intention of perpetrating such an attack (are non-violent individuals) would be labeled as
potentially dangerous (O’Toole 2000). The FBI report recommended that an assessment should
comprise four key domains including personality traits and behaviors, family dynamics, school
dynamics, and social dynamics (Borum et al. 2010). There is no single cause that propels or drives
an individual to commit a school shooting. School violence needs to be seen as the outcome of
a wide range of causal processes (Henry 2009).
In the study conducted by the United States Secret Service and United States Department of
Education (Vossekuil et al. 2002), 37 incidents of school violence involving 41 students between 1974
to 2000 were examined. Findings indicated a variety of common features among the school shooters.
The majority of the shooters were depressed, had feelings of persecution, had grievances against at
least one of their targets and had an interest in violent entertainment. Interestingly, a history of drug
abuse, prior violence or criminal behavior or animal cruelty were not found in the majority of the
school shooters.
There have also been some other well-cited studies investigating school shooters. Verlinden, Hersen,
and Thomas (2000) carried out a review of risk factors among 10 school shooters. Similar to the O’Toole
(2000) study, a number of areas were examined including individual, family, school/peers, and societal/
environmental factors were examined in the study. The factors which were identified as being most
common were: a history of aggression, uncontrolled anger, depression and suicidal ideation, discipline
problems and feeling rejected and bullied (“picked on”). Another study carried out by Meloy et al. (2001)
reviewed 37 adolescent mass murderers. Eight of these 37 adolescent mass murderers were classified as
“classroom avengers” and are therefore of specific interest here. Findings showed that the school shooters
often were bullied but did not bully others. They were also found to be preoccupied with weapons and
fantasy. Many also had a history of substance abuse. The majority were not depressed and had no history
of antisocial behaviors. In another study, Leary et al. (2003) reviewed 15 school shootings and found
a number of common features. The sample comprised of cases which were well-documented cases of
school violence which occurred in the United States between January 1995 to March 2001. They started
from 1995 because that was when school shootings started to receive national attention. Findings from
the study showed that acute or chronic rejection (in the form of ostracism, bullying, and/or romantic
rejection) was present in all but two of the incidents. It was also found that there was a tendency for the
shooters to be characterized by one or more of three other risk factors, namely, an interest in firearms or
bombs, a fascination with death or Satanism, or psychological problems involving depression, impulse
control, or sadistic tendencies (Leary et al. 2003). The findings by Leary and colleagues are consistent
with the hypothesis that social rejection is a contributory factor in the majority of school shooters.
Specifically, 12 of the cases involved an ongoing pattern of teasing, bullying, or ostracism. Also, at least six
of the school shooters had experienced a recent romantic rejection. No clear evidence of rejection was
2 D. A. KEATLEY ET AL.
found in only two of the 15 school shooters (Leary et al. 2003). Such findings support earlier findings
(e.g., Vossekuil et al. 2002). Vossekuil et al. (2002) found evidence for bullying, ostracism, and social
rejection in over two-thirds of the school shooting cases they examined (Vossekuil et al. 2002).
There are a variety of reasons which makes the study of school shooters difficult to study
(Langman 2009). For instance, thankfully, the event is relatively rare so sample sizes are relatively
small across studies. Also, the perpetrators very often commit suicide or are killed by police at the
scene. This further limits researchers to a retrospective review of the perpetrators’ lives, and/or
interviews with people who knew the perpetrators. Lastly, across studies investigating school
shooters, there are varying definitions of what a school shooting or a rampage school shooting is.
This results in somewhat different, but nevertheless overlapping, populations being investigated.
Some samples studied by researchers include student-perpetrated firearms deaths which took place
at school, while other samples studied by researchers include perpetrators of larger-scale attacks
(Langman 2009). Newman (2004) and Newman and Fox (2009) define rampage school shootings as
involving students who attend (or had formerly attended) the school where the shooting occurred;
took place on a school-related “public stage” (i.e., in full view of other people); and involving
multiple victims, at least some of whom were shot randomly or as a symbol (such as a principal
who represents the school). Other victims may be targeted as a result of a grievance or perceived
wrong (Langman 2009). The definition of school shooters outlined by Newman (2004) is the
definition used in the present study.
Clearly, the focus of research is being directed towards crime prevention through understanding
the complex dynamics leading-up to school shootings. This is the key focus of the current study, too:
to elucidate the complex pattern of behaviors and antecedent events that precede a school shooting.
Understanding individual risk factors for school shooting provides an overview of key warning signs
to be vigilant towards; however, mapping the temporal relationships between risk factors can provide
an insight into the predictive pathways that lead towards crime (Keatley 2018).
Recently, research in criminology has begun to focus on temporal methods, such as Behaviour
Sequence Analysis (BSA, Keatley 2018; Keatley et al. 2018), Indicator Waves (Keatley and Clarke 2018),
and Crime Script Analysis (Leclerc and Wortley 2014), which allow researchers to clearly map the life
histories and antecedent events and behaviors that lead to a school shooting. The focus of temporal
research is not to undermine the important research into risk factors; but, to take a step further and ask
not only what the risk factors are; but, whether the order they occur in matter. From here, important
issues can be highlighted, such as key “hot spots” or “critical points” (Keatley 2018), wherein inter-
ventions are most effective. Clearly, school shootings are underpinned by a wide variety of behaviors or
“risk factors”, and no single behavior is reliably predictive of later events. However, temporal analyses
allow researchers to understand whether the progression of several behaviors is more likely to lead to
a school shooting than other sequences.
However, a limitation of BSA research is that it requires complete, detailed datasets, which are
often hard to gather comprehensively in real-world events. Information regarding every step and
detail of school shootings is either vague, missing, or classified. This poses a problem for traditional
BSA approaches, as misleading chains may occur (if events or behaviors are systematically missing
across samples). There are, however, other temporal methods that provide an overview of the general
trends and chains in behavior, while requiring less detailed data, such as Crime Script Analysis (CSA;
Cornish 1994; Ekblom and Gill 2016).
Crime script analysis (CSA; Cornish 1994; Ekblom and Gill 2016) was developed from general
schemata and scripts in Cognitive Psychology (Schank and Abelson 2013); though, it can also be
conceptualized in terms of computer scripts in programming. In the same way that actors in a play
follow a theatrical script, with acts and scenes, researchers have suggested that criminals follow
a similar script in the commission of their crime (Leclerc, Smallbone, and Wortley 2013; Leclerc and
Wortley 2014). In a similar psychological process as individuals entering a restaurant and knowing
the general progression of events, as criminals act out their crimes they follow scripts that direct or
guide their behavior. Nisbett and Ross (1980) outline scripts as being temporal sequences that extend
DEVIANT BEHAVIOR 3
across time and infer some causal relationships between scenes, in that earlier behaviors or events
precede or enable later events.
Crime Script Analysis is important in being able to understand the sequential flow of behaviors
and actions, allowing deeper understanding and insight into the process of crime. This provides
investigators with a more detailed account of how crimes unfold over time, rather than “snapshot”
approaches, which portray crime as a single event in space and time. However, a more important
output of CSA is in terms of crime prevention strategies. Recent research has focused on crimes such
as burglary (Homel, Macintyre, and Wortley 2014) and child sexual assault (Leclerc, Smallbone, and
Wortley 2013) through a CSA lens, not only to understand the process of the crimes; but, to
highlight key stages of the script in which intervention might have more effect. A similar approach
has been taken with terrorist acts to highlight how interventions such as transportation might have
been an effective deterrent (Meyer 2013). In terms of school shootings, purchasing or acquiring
a weapon necessarily precedes the school shooting event. The CSA approach outlines what other
behaviors and events are related to such key actions, and further analyses then allow researchers to
provide intervention strategies.
Current study
The aim of the current paper is to provide a novel method for mapping and describing the temporal
development of school shootings. Crime Script Analysis (CSA; Cornish 1994; Ekblom and Gill 2016) will
be outlined and shown to be an effective method, which has not been previously applied to the area of
school shootings. Crime Script Analysis (CSA) is a methodological approach that builds on the cognitive
psychology approach of script analysis (Schank and Abelson 2013), using schemata (Cornish 1994).
Script analysis essentially outlines the general trends of behavior, with the quintessential example being
the restaurant script, in which people can operate in different restaurants successfully by following
a generalized script of how to behave in such contexts. The script concept has been applied to crimes
(Beauregard et al. 2007; Ekblom and Gill 2016; Hutchings and Holt 2015), showing that criminals follow
a similar script and schemata process when planning and commissioning their crimes.
The aim of the current study is to investigate the behavioral sequences of school shootings, using
a crime script analysis approach. The general script will outline the preparation and planning stage
behaviors, and how these lead to the commission of the act itself, which leads to the “exit” or final
behaviors. A series of school shooting events will be used to define and clarify the scenes in the crime
script analysis, and provide examples of the typical behaviors exhibited in each scene. This is the first
paper, to the authors’ knowledge, to explicitly link crime script analysis to school shootings and
provides an initial framework to understand the dynamics of school shootings, and a starting point
for future cases to be added to.
Methods
Sample
The sample consisted of 16 individual cases of school shootings in the United States of America (see
Table 1). The majority of cases involved in a male shooter (n = 15); and the average age was 20.68 years
(SD = 10.09, range = 11–55). An average of 11.88 (SD = 12.41, range = 2–45) people were killed in the
school shootings. An average of 15.44 (SD = 14.14, range = 1–58) people were injured in the school
shootings. Guns were the most used weapon; however, bombs or dynamite were also used in several
cases. There were almost equal numbers of suicides (n = 6) as arrests (n = 7) in the sample.
When identifying individuals for the sample a variety of sources were consulted, including databases
for school shootings (e.g., schoolshooters.info; PACER.), news reports, court reports, police and
government reports, and general media accounts. In cases where data were not sourced from official
4 D. A. KEATLEY ET AL.
Ta
b
le
1.
D
es
cr
ip
ti
ve
in
fo
rm
at
io
n
of
sc
h
oo
l
sh
oo
te
rs
.
N
am
e
A
g
e
D
at
e
G
en
d
er
Lo
ca
ti
on
Ty
p
e/
n
am
e
of
sc
h
oo
l
N
um
b
er
ki
lle
d
N
um
b
er
in
ju
re
d
W
ea
p
on
s
us
ed
A
rr
es
te
d
/
Ki
lle
d
/
su
ic
id
e
A
n
d
re
w
Ke
h
oe
55
1s
t
Fe
b
18
72
M
M
ic
h
ig
an
(U
.S
.)
Ba
th
C
on
so
lid
at
ed
sc
h
oo
l
45
58
Bo
m
b
s
&
d
yn
am
it
e
Su
ic
id
e
C
h
ar
le
s
W
h
it
m
an
25
1s
t
A
ug
19
66
M
A
us
ti
n
(U
.S
.)
U
n
iv
er
si
ty
of
Te
xa
s
14
31
G
un
s
Ki
lle
d
b
y
p
ol
ic
e
Br
en
d
a
Sp
en
ce
r
16
29
th
Ja
n
19
79
F
C
al
ifo
rn
ia
(U
.S
.)
G
ro
ve
r
C
le
ve
la
n
d
El
em
en
ta
ry
sc
h
oo
l
2
9
G
un
A
rr
es
te
d
Er
ic
C
h
ri
st
op
h
er
H
ou
st
on
20
1s
t
M
ay
19
92
M
C
al
ifo
rn
ia
(U
.S
.)
Li
n
d
h
ur
st
H
ig
h
sc
h
oo
l
4
9
G
un
s
A
rr
es
te
d
Lu
ke
W
oo
d
h
am
16
1s
t
O
ct
19
97
M
M
is
si
ss
ip
p
i
(U
.S
.)
Pe
ar
l
H
ig
h
sc
h
oo
l
3
7
G
un
s
&
kn
iv
es
A
rr
es
te
d
M
ic
h
ae
l
C
ar
n
ea
l
14
1s
t
D
ec
19
97
M
Ke
n
tu
ck
y
(U
.S
.)
H
ea
th
H
ig
h
sc
h
oo
l
3
5
G
un
s
A
rr
es
te
d
A
n
d
re
w
G
ol
d
en
11
24
th
M
ar
ch
19
98
M
A
rk
an
sa
s
(U
.S
.)
W
es
ts
id
e
M
id
d
le
sc
h
oo
l
5
10
G
un
s
A
rr
es
te
d
(la
te
r
re
le
as
ed
)
M
it
ch
el
l
Sc
ot
t
Jo
h
n
so
n
13
24
th
M
ar
ch
19
98
M
A
rk
an
sa
s
(U
.S
.)
W
es
ts
id
e
M
id
d
le
sc
h
oo
l
5
10
G
un
s
A
rr
es
te
d
Ki
p
la
n
d
Ph
ill
ip
Ki
n
ke
l
15
30
th
A
ug
19
98
M
O
re
g
on
(U
.S
.)
Th
ur
st
on
H
ig
h
sc
h
oo
l
4
26
G
un
s
A
rr
es
te
d
D
yl
an
Kl
eb
ol
d
17
20
th
A
p
ri
l
19
99
M
C
ol
or
ad
o
(U
.S
.)
C
ol
um
b
in
e
H
ig
h
sc
h
oo
l
13
20
G
un
s
&
p
ip
e
b
om
b
s
Su
ic
id
e
Er
ic
H
ar
ri
s
18
20
th
A
p
ri
l
19
99
M
C
ol
or
ad
o
(U
.S
.)
C
ol
um
b
in
e
H
ig
h
sc
h
oo
l
13
20
G
un
s
&
p
ip
e
b
om
b
s
Su
ic
id
e
D
av
id
A
tt
ia
s
20
23
rd
Fe
b
20
01
M
C
al
ifo
rn
ia
(U
.S
.)
U
n
iv
er
si
ty
of
C
al
ifo
rn
ia
,
Sa
n
ta
Ba
rb
ar
a
ca
m
p
us
4
1
C
ar
A
rr
es
te
d
Se
un
g
H
ui
C
h
o
23
16
th
A
p
ri
l
20
07
M
V
ir
g
in
ia
(U
.S
.)
V
ir
g
in
ia
Te
ch
U
n
iv
er
si
ty
32
18
G
un
s
Su
ic
id
e
A
d
am
La
n
za
20
14
th
D
ec
20
12
M
C
on
n
ec
ti
cu
t
(U
.S
.)
Sa
n
d
y
H
oo
k
El
em
en
ta
ry
sc
h
oo
l
27
2
G
un
s
Su
ic
id
e
El
lio
t
Ro
d
g
er
22
23
rd
M
ay
20
14
M
C
al
ifo
rn
ia
(U
.S
.)
U
n
iv
er
si
ty
of
C
al
ifo
rn
ia
,
Sa
n
ta
Ba
rb
ar
a
ca
m
p
us
6
14
Kn
iv
es
&
h
an
d
g
un
Su
ic
id
e
C
h
ri
st
op
h
er
H
ar
p
er
M
er
ce
r
26
1s
t
O
ct
20
15
M
O
re
g
on
(U
.S
.)
U
m
p
q
ua
C
om
m
un
it
y
co
lle
g
e
10
7
G
un
s
Su
ic
id
e
Ev
id
en
ce
of
m
en
ta
l
h
ea
lt
h
is
su
es
/b
ra
in
in
ju
ry
/
n
eu
ro
d
ev
el
-o
p
m
en
ta
l
d
is
or
d
er
s
H
is
to
ry
of
b
ul
ly
in
g
in
ch
ild
h
oo
d
Pa
re
n
ts
d
iv
or
ce
d
/
se
p
ar
at
ed
in
ch
ild
h
oo
d
Ex
p
el
le
d
fr
om
sc
h
oo
l
A
ca
d
em
ic
at
ta
in
m
en
t
d
et
er
io
ra
ti
on
Pr
ev
io
us
cr
im
in
al
h
is
to
ry
A
cc
es
s
to
w
ea
p
on
s
(o
w
n
ed
b
y
sh
oo
te
r/
fa
m
ily
)
&
w
ea
p
on
p
ro
fic
ie
n
cy
Th
re
at
s/
ve
rb
al
is
in
g
vi
ol
en
t
th
ou
g
h
ts
to
ot
h
er
s,
in
w
ri
ti
n
g
et
c
U
N
U
N
U
N
U
N
U
N
N
Y
Y
Y
U
N
N
D
is
ch
ar
g
e
fr
om
m
ili
ta
ry
Y
N
Y
Y
Y
U
N
Y
N
Y
Y
Y
Y
U
N
U
N
N
–
d
ro
p
p
ed
ou
t
N
N
U
N
Y
Y
Y
Y
N
N
N
N
U
N
Y
Y
N
N
N
N
N
Y
N
N
N
N
U
N
U
N
Y
U
N
U
N
N
Y
U
N
U
N
Y
N
Y
Y
U
N
N
N
U
N
Y
Y
Y
N
Y
N
N
N
Y
N
Y
Y
Y
N
N
N
Y
N
Y
Y
N
N
N
U
N
U
N
Y
U
N
Y
Y
N
N
U
N
N
N
Y
Y
N
Y
N
Y
N
Y
Y
Y
Y
Y
N
U
N
N
N
Y
Y
Y
Y
Y
–
d
is
ch
ar
g
ed
fr
om
ar
m
y
U
N
N
Y
Y
N
ot
e.
Y
=
ye
s
(p
re
se
n
t)
;
N
=
n
o
(n
on
e/
ab
se
n
t)
;
U
N
=
un
kn
ow
n
;
sc
h
oo
l
sh
oo
te
rs
ar
e
lis
te
d
in
d
iv
id
ua
lly
,
ev
en
if
th
ey
w
or
ke
d
in
p
ai
rs
(e
.g
.,
Kl
eb
ol
d
&
H
ar
ri
s;
G
ol
d
en
&
Jo
h
n
so
n
).
DEVIANT BEHAVIOR 5
Law Enforcement sources, facts were cross-referenced between independent sources to ensure validity.
While this does not guarantee accuracy, it is an approved method in applied research (Keatley 2018).
Inclusion criteria were that the school shooting was documented in enough detail to allow clear
and comprehensive analyses. Inclusion criteria in the current study were that: the offense happened
in a “public location” – here operationalized as the school property; there were multiple victims
(both killed and injured); multiple victims targeted and untargeted; the offender had current or
former links with the school. A final inclusion criterion was method-specific and considered the
depth and quality of information available. For CSA to provide a systematic, step-by-step account of
developing behaviors, reports of the school shooting had to provide enough detail to satisfy this
criterion. This was important as the current research forms the foundation framework for future
research; therefore, complete accounts allowed for more informed crime script analysis. Future cases
with less data may be included as long as the base framework is well informed. This allows for
consistent comparative analyses between cases.
Script development
Crime scripts can be built from a variety of data, and there are no clear guidelines on the type of data
that can be used (Borrion 2013); indeed, the inclusion of multiple sources and types of data is
a strength of the crime script approach. There have been several revisions to the crime script
approach (Ekblom and Gill 2016); therefore, the current study will apply the most recent advance-
ments in crime script developments, to provide clear and concise scripts that break down long chains
of behaviors into five clear scenes or stages: preparation; pre-condition; instrumental actualization;
doing; and exit. The current study will follow Leclerc, Wortley, and Smallbone’s (2011) recommen-
dations, and include a visualization approach to outline the crime script and details. The current
study visualizes the data in the form of a Crime Script table (see Table 2).
The process of developing a crime script in the current study followed previously approved
protocols in the literature (Chiu 2015). First, cases were found with in-depth, sequential information
(rather than simply stating, “suspect had a gun”, the information needed to be grounded in some
form of timeline so that we could understand when they obtained the gun). Once multiple cases of
school shooter timelines had been sourced, a process of familiarization took place, wherein research-
ers read through each timeline and began mapping the sequential flow of scenes within each case,
using CSA scenes as a building block. For each case, behaviors were analyzed and discussed in terms
of which scene they belonged to. This process was iterated for each new case, and scenes were
developed to represent the data, rather than the data being forced to fit into scenes, which is why the
scene codes for the current study follow a similar structure as previous research; but, have different
scene names. Once researchers agreed that all behaviors were included in the crime script, and the
scenes within the crime script were sequential but distinct, the CSA was finalized.
Coding procedure
Cornish (1994) suggested that a standardized method for promoting richer, more comparable crime
scripts is to use a universal script. The universal script allows researchers to develop and organize
crime scripts in a systematic way that provides a cohesive framework and allows for future research
to easily build on. The universal script also outlines procedural aspects and requirements of the
planning and commissioning of a crime, at a more generalized, global level. More specific scenes can
then be developed for particular subtypes of related crimes (e.g., “school shootings” → Schools/
Colleges/Universities). As the present research is the first of its kind, a global, universal script was
developed. The data in the current study were initially coded through open coding and data-driven
approaches, using the universal script scenes proposed by Cornish (1994). All scenes and informa-
tion therein were agreed on by two researchers.
6 D. A. KEATLEY ET AL.
Ta
b
le
2.
C
ri
m
e
sc
ri
p
t
an
al
ys
is
of
sc
h
oo
l-
sh
oo
te
r
b
eh
av
io
rs
.
Sc
h
oo
l-
sh
oo
te
r
sc
ri
p
t
sc
en
e
U
n
iv
er
sa
l
sc
ri
p
t
sc
en
e
Be
h
av
io
ur
s
Ex
am
p
le
s
1.
In
flu
en
ce
s
Pr
ep
ar
at
io
n
●
A
tt
en
d
ed
th
er
ap
y,
p
ar
en
ts
se
p
ar
at
ed
.
●
Ra
is
ed
ar
ou
n
d
fir
ea
rm
s,
p
re
vi
ou
s
cr
im
es
.
●
Sa
id
to
h
av
e
sh
ow
n
an
g
ry
b
eh
av
io
rs
an
d
m
ay
h
av
e
p
re
vi
ou
s
ch
ar
g
es
fo
r
un
re
la
te
d
cr
im
es
.
●
La
n
za
–
m
ot
h
er
=
g
un
en
th
us
ia
st
●
W
h
it
m
an
–
ta
ug
h
t
b
y
p
ar
en
ts
to
h
an
d
le
g
un
s
●
Ki
n
ke
l
–
fa
th
er
b
ou
g
h
t
h
im
th
e
g
un
●
M
er
ce
r
–
sh
ow
ed
in
te
re
st
in
m
as
s
sh
oo
ti
n
g
s
&
IR
A
2.
O
p
er
at
io
n
al
Pr
e-
co
n
d
it
io
n
●
St
ol
e
fr
om
p
ar
en
ts
or
g
iv
en
to
th
em
b
y
a
p
ar
en
t.
●
Kn
iv
es
an
d
h
om
em
ad
e
b
om
b
s
al
so
us
ed
.
St
ol
e
w
ea
po
n
●
La
n
za
(M
ot
h
er
’s
);
C
or
n
ea
l
(o
w
n
an
d
fr
ie
n
d
’s
h
ou
se
)
G
iv
en
w
ea
po
n
●
Sp
en
ce
r
(F
at
h
er
);
Ki
n
ke
l
(F
at
h
er
)
3.
Re
co
n
n
ai
ss
an
ce
In
st
ru
m
en
ta
l
ac
tu
al
iz
at
io
n
●
Th
ei
r
ow
n
sc
h
oo
l/
un
iv
er
si
ty
,
cu
rr
en
tl
y
at
te
n
d
in
g
or
p
re
vi
ou
sl
y.
●
Jo
h
n
so
n
,
G
ol
d
en
,
W
oo
d
h
am
,
st
ol
e
a
p
ar
en
t’s
ca
r
fo
r
tr
an
sp
or
t.
O
w
n/
Cu
rr
en
t
Sc
ho
ol
●
La
n
za
;
Kl
eb
ol
d
&
H
ar
ri
s
Pr
ev
io
us
Sc
ho
ol
●
Ki
n
ke
l
4.
A
ct
iv
it
y
D
oi
n
g
●
So
m
e
b
eg
an
at
h
om
e
b
ef
or
e
m
ak
in
g
th
ei
r
w
ay
to
th
e
sc
h
oo
l/
un
iv
er
si
ty
.
●
M
os
t
se
em
ed
d
is
or
g
an
iz
ed
,
sh
oo
ti
n
g
ra
n
d
om
ly
.
●
So
m
e
sh
ow
ed
cl
ea
r
m
ot
iv
at
io
n
to
ki
ll
ce
rt
ai
n
st
ud
en
ts
.
H
ar
m
fa
m
ily
m
em
be
rs
●
La
n
za
(M
ot
h
er
);
Ke
h
oe
(W
ife
);
W
h
it
m
an
(W
ife
,M
ot
h
er
);
W
oo
d
h
am
(M
ot
h
er
);
Criminal Behaviour CRM203
Workshop 5: Sex Offenses
‹#›
1
Content
Legal aspects
Psychological aspects Statistics
Characteristics of sex offences
Classification of sex offenders
Cultural factors and sex offending
‹#›
2
KEY POINTS
One of the most serious issues for students of criminal behaviour
True rate of offending not known
In view of 2, what is known about offenders is possibly skewed
Sexual behaviour is principally learned behaviour. Although the sexual drive is naturally innate, the expression of sexual behaviour is learned.
‹#›
3
Classification
The aim of classification is to allow for better understanding of different factors and may be useful in development of treatment.
The main classifications are related to rape and to North American perspectives. As noted, this may be a limitation since it is dependent upon those who are caught.
Availability of weapons might also be an issue.
Given that cognitions play an important factor, north American attitudes may be different to other cultures
‹#›
4
Massachussetts Treatment Centre (MTC)
Recognises both aggressive and sexual features
Incorporates both into classification
‹#›
5
Displaced Aggression
Also known as displaced anger or anger retaliation
Rape is a violent act, anger & aggression are the motivation – the intent is to hurt, sexual violence and degradation is just another component of overall violence
No indications of sexual pleasure from the offender;
Victim resistance increases violence
‹#›
6
Displaced Aggression
(eg offender who cut face of wife to ensure she retained a memory of him, then raped her and her girlfriend)
Concept of displacement – offender attacks women who are unknown but representative of their anger objects
‹#›
7
Displaced Aggression
Perceive women as unfaithful, users and not loving
May be in relationships but these are not happy
Dysfunctional backgrounds including neglect and abandonment
‹#›
8
Compensatory
Sex is motivation
Passive individuals act out fantasies
Compensates for inadequacy; retreats from victim resistance
Believes victims will come to love him
‹#›
9
Compensatory
Problems with intimacy, and self esteem
Functional in other areas of life but not high achievers
Not generally anti-social
eg offender who used stupefying drugs to assault, believed that victims would love him after the offence.
‹#›
10
Sexual Aggressive
AKA Sadistic Rapist:
Motivated by sex and aggression
Aroused by pain of victim
Offence characterised by sadistic sexual assault and severe physical injury
Enjoys victim resistance
‹#›
11
Sexual Aggressive
Believes victims enjoy the experience
Believes yes means no (see B&B)
Difference between sadist and displaced: sadist – the assault and violence was part of the sex act
‹#›
12
Impulsive
Opportunistic
Impulsivity
Limited violence – enough to overcome resistance
Victim resistance probably deters.
Best described as a sexual thief – just takes anything he wants including sex
‹#›
13
MTC:R3
MTC:R3 utility for offender profiling
Opportunistic (impulsive): High and low social competency distinction
Pervasive anger: anger problems, very violent
Sexual gratification: sadistic and non-sadistic and further divided by social competency
Vindictive: displaced aggression and further divided by social competency
‹#›
14
Groth’s Classification
Doesn’t accept straight sexual gratification/arousal in rape
Believes rape is motivated by power and aggression
Feminist perspectives were very powerful force in 1970’s – strongly argued against viewing sexual assault as a sex act
This perspective is evident in Groth’s classification
Groth’s typology of adult, male rapists (Taken from Gavin, 2014)
‹#›
15
Anger Rape
Aim is to hurt and humiliate
Is acted out of anger
Offender views sex as dirty and the assault humiliates victim
Includes violence and brutality
Estimated 40\% of rapes
‹#›
16
Power Rape
Aim is to control and demonstrate masculine power
Victims may be assaulted to get compliance
May include long term captives
Estimated 55\% of rapes
‹#›
17
Sadistic Rape
Aggression is eroticised
Estimated 5\% of rapes
‹#›
18
Power Reassurance
Least violent and aggressive
Least socially competent
Problems with low self-esteem and feelings of inadequacy
Involvement in transvestism or promiscuous sexual behaviour:
Voyeurism
Fetishism
Purpose of the rape is to elevate his status and the primary aim is sexual – the sex act validates his position of importance
Only enough force necessary to commit the rape
‹#›
19
Power Reassurance
Social characteristics
Single
Living with parents
No sex partner
Non-athletic
Quiet, passive
Social loner
Menial occupation
Preference for adult bookstores
Voyeur
Exhibitionist
Fetishist
‹#›
20
Power Reassurance
Neighbourhood attack
Belief that the victim enjoys the rape
Little use of profanity
Victim asked to ‘talk dirty’
Victim asked to remove clothing
Only body parts essential for the rape are exposed
Victim same age cohort as rapist
Rape committed every 7-15 days
Rapist travels on foot
Rapist may be impotent
Use of weapon of opportunity
Increasing violence as rape increases in number
Possible later contact with victims
Possible covering of victim’s face
Rapes continue until apprehended
Possible collection of souvenirs
Rapist might keep a written diary
‹#›
21
Power Reassurance
Power Reassurance (Compensatory)
This offender has fantasies that involve a consensual relationship with the victim, and although there may be violence involved, it is more likely that he will try to avoid doing so in order to preserve the fantasy. When victims fight with this type of offender, he is more likely to attempt to compromise or leave because an attacking victim has destroyed the fantasy. This type of offender does not wish to hurt the victim, and there have been cases where this sort of offender attempts to contact the victim after the attack.
‹#›
22
Anger Retaliatory
Purpose to hurt victims – victim is an object – choice of victim female in wrong place at wrong time
Rape to get even with women and compensate for injustice experience (real or imagined) by other women
Rapist perception of self: athletic and masculine
Family and friends will report he has a quick and violent temper
Connection between sexual gratification and his expression of anger and rage
‹#›
23
Anger Retaliatory
Social characteristics
Divorced parents
Low level education
Married
Physically abusive
Socially competent
Hatred for women
Adopted (in 20\% of cases)
Wife not assaulted
Athletic
Bars frequented to find victims
Preference for contact sports
Action-oriented occupation
‹#›
24
Anger Retaliatory
Neighbourhood attack
Blitz attack
Little planning
Intent to harm victim
Use of weapons of opportunity
Victim’s clothing ripped off
Use of excessive profanity
Rapes committed every 6 months to 1 year
Possible ejaculation into face of victim
Anal then oral sex
Victim same age or older than rapist
Possible retarded ejaculation
Increasing aggression
Situation-precipitated attack
‹#›
25
Anger Retaliatory
Anger Retaliatory (Displaced)
This offender is one who is punishing the victim for real or perceived wrongs done to him early in life. For this individual, the act of rape is justified by the fact that he is taking revenge upon those (type of victim) who have hurt him in the past. Like the Power Assertive rapist, he may use great violence as a means to punish or degrade the victim.
‹#›
26
Power Assertive
Rape is an attempt to express virility and personal dominance
Sense of superiority in being male
Rape is an entitlement
Rape is an impulsive act of predation – aggression is shown to secure compliance of the victim
No use of masks, blindfolds or darkness
‹#›
27
Power Assertive
Social characteristics
Single parent home in childhood (69\%)
Time spent in foster homes (31\%)
Physical abuse in childhood (74\%)
High school dropout
Serial marriages
Image conscious
Preference for single bars
Macho occupation
Domestic problems
Property crime record
Athletic
Dishonourable discharge from military
‹#›
28
Power Assertive
Rapist cruises singles bars
Attacks occur from 7pm to 1am
Victim’s clothing likely to be torn
Rapist strikes about every 20- 25 days
Multiple assaults perpetrated
Assault is often both anal and oral
Rapist is selfish in his behaviour
Rapist has retarded ejaculation
Rapist has no further contact with the victim
Victim is conned and overpowered
Rapist does not hide identity
Rapist’s attack is brutal
Victim is of rapist’s age group
Victim is of rapist’s race
‹#›
29
Power Assertive
Power Assertive (Exploitative)
This offender may have self-esteem problems and rapes the victim in order to prove to himself that he is a man. This offender does not want the victim to be a participant like the power reassurance rapist, as he must prove to himself that he is able to dominate the victim. If the victim attempts to fight off the offender, the violence will escalate to maintain the dominant position.
‹#›
30
Anger Excitatory
Rape is an expression of sexually aggressive fantasies
Purpose to inflict physical and psychological pain on the victim
Antisocial personality
Connection made between sexual gratification and aggressive behaviour – aggression and violence has been eroticised
‹#›
31
Anger Excitatory
Social characteristics
Single parent home in childhood (60\%)
Time spent in foster homes (13\%)
Physical abuse in childhood (63\%
Sexually deviant home in childhood
Middle-class family man
Some college education
Married
No arrest record
Age range 30-39
Compulsive personality
White-collar occupation
‹#›
32
Anger Excitatory
Victim stalked
Victim transported
Use of gags, bondage, handcuffs
Possible use of blindfolds
Victim’s clothing cut
Elements of ritualism
Degrading language
Retarded ejaculation
Increasing violence with additional rapes
Rapist has rape kit
Rapist may eventually kill
Periods between rapes vary
Victim’s ages vary
ANYWHERE, ANYTIME, ANYPLACE, ANYONE
‹#›
33
Behaviour
Approximate
frequency (\%)
Makes
a surprise approach
35\%
Child present during stranger attack
0.05\%
Use weapon to control victim (e.g., threaten with knife)
22.5\%
Offender
reveals details about himself
40\%
Offender
kisses victim
36\%
Offender
rips clothing
12.3\%
Blindfold
or gag
3.5\%
Offender kicks or punches victim (more than once)
15\%
Offender
apologises to victim
6.7\%
Blitz
attack (sudden violence on initial approach to overpower victim
1\%
Frequencies of behaviours in sexual attacks in stranger rapes
Rape Behaviour Statistics
Legal Aspects
Types of assault: indecent & sexual penetration and others
Aggravation: for example being armed (or pretending to be), harm, age of victim, degradation of victim, threats, in company
‹#›
35
Types of non-consent
Threats to victim or others
Victim is detained
Victim is asleep, unconscious, or impaired by drugs
Mistaken identity
Doesn’t understand
Believes it is for medical purposes
Consent is fraudulent
Consent is withdrawn
‹#›
36
Psychological Aspects
Distinction between dysfunction, paraphilia, and unlawful behaviour
For example:
Bestiality, voyeurism, frotteurism, rape, paedophilia, indecent exposure, necrophilia, pornography (especially child), obscene calls, fetishism, masochism, bigamy, homosexuality (at different ages/times), adultery (different places/times)
‹#›
37
Statistics
Great variations in reports of sex offences between and within jurisdictions
Official statistics do not resemble actual levels
Actual level is difficult to determine and official statistics are dependent upon many other factors – in some countries victims are criminalised and in many ostracised
‹#›
38
In Australia
1 in 5 females & 1 in 20 males sexually assaulted since age 15
1 in 3 females & 1 in 6 males abused before age 18
93\% of offenders are males
30\% or less report offences to the police
20\% of reports lead to criminal proceedings by police (ie investigated – nearly 80\% no further action after reporting)
‹#›
39
In Australia
10\% of incidents result in guilty outcome; between 1/4 and 1/3 do not make it to court
3\% of offences result in conviction
Girls age 10 to 14 in highest victimisation bracket followed by 15 to 24; then 0 to 9 which is higher than 25 to 44
30\% by family member; 43\% by known other (but may include family member); 21\% by stranger (but 8\% for 0 to 9 group)
60\% in private dwelling with another 6\% in other residential
‹#›
40
Key Issue: INCREASE REPORTING
Any strategy that decreases reporting is counter-productive
See especially any strategies/laws which punish offenders excessively
‹#›
41
Why is it not reported?
Concerns about offender
Disruption of family, life
Not believed
CJS procedures too humiliating
Assumed guilt of the victim
Fear of retaliation
Victim didn’t know it was illegal
Fear of being “silly”
‹#›
42
Why is it not charged?
no offender located
insufficient evidence
victim did not wish to proceed
police believe it is false reporting
‹#›
43
Overall:
Low rates of conviction
Strangers much more likely to be reported
Knowledge is based on convicted
Biased sample thus biased knowledge
‹#›
44
‹#›
45
Recidivism
High recidivist rate, in WA:
non-Aboriginal sex offender .35 (base rate .45)
Aboriginal sex offender .80 (base rate .75)
But old study and biased
Currently estimated at 15\% on average but goes much higher with persistent offenders and anti-social offenders
‹#›
46
Theory Perspectives
Rape and power theory.
Rape is an expression of masculine power (ie not motivated by insecurity but by masculine pride); and/or
Rapist is insecure, threatened by women, uses rape as an expression of power and domination.
‹#›
47
Theory Perspectives
Rape and violence theory
Rape as an act of violence
Instrumental sexual aggression: use just enough violence to achieve their goal
Expressive sexual aggression: violence part of the sexual experience
‹#›
48
Theory Perspectives
Sexual gratification theory
Traditional explanation - rape is sexual gratification
‹#›
49
Cultural Perspective
Cultural factors play an important role in rape especially the endorsement of rape myths:
Uncontrollable urges ie self restraint is reduced but evidence on level of planning refutes this.
Mental disturbance, weak personality etc - no evidence to support this.
Blame it on the alcohol or some other drug.
Blame it on the victim - she enticed me
‹#›
50
Cultural Perspective
False report – she asked for it, “woman with skirt up can run faster than man with pants down”, needle and thread
In any case, sexual behaviour is learnt in a culture. ie. learning and culture are important.
Cognition is critical factor. Both learning and cultural impact on cognition and see criminogenic attributes.
‹#›
51
Attributes of sex offenders
Arousal
Rapists are aroused by scenes of consenting & non-consenting sex.
Non rapists inhibited by violence or non-consenting sex.
Material that depicts women in demeaning roles or contains violence is likely to entice a potential offender to commit acts of sexual offending.
Aberrant sexual arousal is also a very high predictor of re-offending.
‹#›
52
Attributes of sex offenders
Empathy
Empathy deficits seem only to centre on victims. Most feel good after rape; 8\% guilty; >1\% concern for victim. Probably neutralisations are more critical than empathy deficits.
Intimacy problems
‹#›
53
Attributes of sex offenders
Self esteem problems with some offenders (see classification above)
Cognitive distortions (see also above), belief systems, attitudes, neutralisations. Literature abounds with offenders displaying criminal sentiments. From denial to cultural norms endorsing rape behaviours
And other criminogenic needs
‹#›
54
Treatment
Standard treatment of criminogenic needs - main additional treatment is on criminal sentiments – attitudes, beliefs, distortions, neutralisations.
As noted, considerable evidence of anti-social sentiments in sex offenders
Treatment of aberrant arousal if present
‹#›
55
Aversive Respondent
Respondent conditioning: sexual behaviour is naturally occurring S-R bond.
S-R bond becomes CS-CR bond.
Aim is to break the CS-CR bond by reconditioning the CS.
Present CS and aversive stimulus. CS then gets associated with unpleasant experience and patients seeks to avoid CS as sexual arousal.
‹#›
56
Aversive Respondent
Aversive stimuli can be
imagery
electrical shock
foul odour
foul taste
shame
anxiety
‹#›
57
Reconditioning
The above seeks to remove the CS as a sexual stimulus.
Reconditioning seeks to introduce new and appropriate stimulus for arousal.
Aim is to develop CS-CR bond where CS is adult females.
‹#›
58
Reconditioning
Techniques include
Fading - the inappropriate CS is gradually removed in favour of an appropriate one. Can also be used in an aversive manner: CS is gradually changed to an aversive stimulus.
These are combined with masturbatory reconditioning.
‹#›
59
Other Techniques
Sometimes the sexual deviation is related to anxiety (see classifications)
Desensitisation is then used - ie. changing stimulus from being anxiety producing to relaxed state.
Eg. Normal S-R sexual bond ie. women in erotic situations.
But this also produces anxiety ie. CS-CR bond of:
WOMEN-ANXIETY
This is replaced with women-relaxation
‹#›
60
Criminal Profiling
Dr David Keatley
1
Case: Zodiac
2
Hunting “the most dangerous animal of all”
3
December 20th, 1968
David Faraday & Betty Lou Jensen
On December 20, 1968, David Arthur Faraday, 17, and Betty Lou Jensen, 16,were on their first date when they pulled over into a lovers lane on Lake Herman Road in Benicia. There, they were forced from the car by a killer and Faraday was shot in the head. Jensen began to run away but was shot multiple times in the back.
4
July 4th, 1969
Michael Mageau & Darlene Ferrin
On July 4, 1969, Michael Renault Mageau, 19, and Darlene Elizabeth Ferrin, 22, were in the parking lot of Blue Rock Springs Park in Vallejo - 4 miles from the first crime scene - when they were shot to pieces, according to the investigator. But while Ferrin was pronounced dead on arrival, Mageau survived being shot in the face, neck and chest.
5
September 27th, 1969
Bryan Hartnell & Cecilia Shepard
On September 27, 1969, Bryan Calvin Hartnell, 20, and Cecelia Ann Shepard, 22, were having a picnic at Lake Berryessa in Napa County when they were approached by a hooded man who bound and stabbed them. Hartnell survived eight stab wounds to his back, but Shepard died two days later.
6
October 11th, 1969
Paul Stine
BEWARE THIS ONE (PHOTOS ARE AVAILABLE)
On October 11, 1969, cab driver Paul Lee Stine, 29, picked up a passenger and drove him to Presidio Heights - where he was shot in the back of the head and robbed. The killer also ripped part of Stines shirt, which he later sent with a letter to a local newspaper.
7
BEWARE THE CYPHERS
Sent to San Francisco Chronicle et al.
8
Who is the Zodiac?
9
FBI Profiling
Organised
Disorganised
Average
-
above IQ
Socially Competent
Skilled work preferred
High birth
-
order
status
Father’s work stable
Sexually competent
Inconsistent childhood discipline
Controlled mood during crime
Use of alcohol with crime
Precipitating situational stress
Living with partner
Mobility (car in good condition)
Follows crime in news media
May change job or leave town
Below
-
average IQ
Socially
inadequate
Unskilled work
Low birth
-
order
statis
Father’s work unstable
Sexually incompetent
Harsh discipline as a child
Anxious mood during crime
Minimal use of alcohol
Minimal situational stress
Living alone
Lives/works near crime scene
Minimal interest in news media
Significant behaviour change
Offender
Characteristics
10
FBI Profiling
Minimal interest in news media
Significant behaviour change
Crime Scene
Characteristics
Organised
Disorganised
Planned offense
Victim a targeted stranger
Personalises victim
Controlled conversation
Crime scene reflects control
Demands submissive victim
Restraints used
Aggressive acts prior to death
Body hidden
Weapon/evidence absent
Transports victim or body
Spontaneous offense
Victim/location known
Depersonalises
victim
Minimal conversation
Crime scene random and sloppy
Sudden violence to victim
Minimal use of restraints
Sexual acts after death
Body left in view
Weapon/evidence often present
Body left at death scene
11
Who is the Zodiac?
12
Suspects
Multiple over the years (Everyone from BTK to UNABOMber)
Possibles:
Lawrence Kane (linked to previous similar crimes)
Ross Sullivan (suspect in previous similar crimes)
Arthur Leigh Allan (prime suspect in Graysmith’s book; talked about wanting to attach a flashlight to a firearm)
Richard Marshall (many lifestyle similarities to Zodiac [basement; films; interests])
Richard Gaikowski (editor for newspaper, voice similar to Zodiac, coworker testimony, ‘GYKE’)
Earl van Best Jr. (son, Gary Stewart names him as Zodiac)
Jack Terrance (son, Dennis Jaufman names him as Zodiac)
Donald Lee Bujok (escaped from Montana Deer Lodge Penitentiary)
Is it any of these? Or none of these? Who else?
DON’T FORGET TO LOOK FOR OTHER CASES….
13
Criminal Behaviour CRM203
Jonbenet Ramsey
‹#›
1
Matters arising
MCQ – well done for all who completed it. Feedback coming on LMS soon
Focus on the essay coming up soon
‹#›
2
background
Family host a Christmas party
6.47pm: Someone at the party places a 911 call. No message left.
6.54pm: police attend – turned away being assured everything is fine
Timeline: 23rd December 1996
December 25th 1996:
5pm: Family spend the afternoon at Fleet White residence.
In the evening Ramsey family drive home
Jonbenet (JB) is asleep on the drive home, when they arrive home (9.30pm), Jon Ramsey (JR) carries Jonbenet up to her bedroom and puts her to bed (she remains asleep)
JR and Burke Ramsey (BR; 9 yr old brother) remain awake for a couple of hours building Mechano set
Family retire to bed
Timeline: 25th December 1996
Before the night is over… Jonbenet will …
Be fed pineapple
Have her underwear changed.
Be tasered
Her hands loosely tied.
Be (sexually) assaulted
Suffer a severe trauma to the back of the head
Be strangled (by a garrotte).
Be killed
Gray = uncertain
BRACE YOURSELVES
December 26th 1996:
Patsy Ramsey (PR) wakes early
PR goes down the back spiral staircase.
At the bottom step she sees the ransom note
Timeline: 26th December 1996
December 26th 1996:
Patsy Ramsey (PR) wakes early
PR goes down the back spiral staircase.
At the bottom step she sees the ransom note
She only reads the first few lines…
She screams/She runs back upstairs to check on JBs room
JR is awoken
Check BR room – he is asleep, they leave him sleeping
5.52am: PR calls the police to report the incident
Timeline: 26th December 1996
Police arrive: 6 am; friends arrive at same time
Perform cursory search of premises
Window in basement found broken
Suitcase beneath window
JR begins process of gaining $118,000
8am: police arrive and set-up wiretrap and recording equipment
Timeline: 26th December 1996
1pm: Linda Arndt asks Fleet White and JR to search the house for ‘anything unusual’
1.30pm: Fleet White and JR discover JB in basement
JR removes tape from mouth and carries her upstairs
JR asks for blanket to cover JB
PR throws herself on JB screaming “help me Jesus”
Linda Arndt moves JB to living room/under Christmas tree and places Colorado Avalanche sweatshirt over her
2pm: JR places call to his pilot to ready Atlanta flight
8pm: Coroner arrives to remove body
Timeline: 26th December 1996
Police report death from asphyxiation
January 4th: Skull fracture found indicating she would have died from a blunt trauma to the skull
She was suffocated while she lay dying.
Timeline: 27th December 1996
PROFILE THE CRIMESCENE
PROFILE THE KILLER
A tale of 2 stories
A cover-up?
https://xiaoyuannn.wordpress.com/tag/crime/
PR and JR did not spend any time together
JR ‘cordial’ as he greeted Arndt at door
10am deadline passed unnoticed
Arndt asked family and friends for clues
Everyone submitted ideas, except JR
Approximately 10.30am, JR is unaccounted for (Searching house)
His demeanour at midday is changed (shocked, withdrawn, saddened)
Arndt’s report
JR told friend: “I found JB at 11am” (2 hours before Arndt orders search)
December 27th, PR sister sent to home to collect ‘list of items’ – including a golf bag (in winter)
2001: JR admits to looking out of son’s upstairs window, and seeing a van – he suggests this was intruders’… but… can also see trash cans
Within hours of JB being found, Ramsey lawyers are already mobilised and making calls
First call: not to potential suspects that Ramsey’s pointed police to, but to Whites and other family friends present.
BR removed from home at approx. 1pm (December 26th)
Kolar’s report (i)
Pineapple found in JBs stomach (eaten shortly before her death) – none served at Fleet White’s party
Sexual assault (digital penetration)
Signs of previous trauma
Blood had been wiped away, but residual amount remained
JB draped in favourite blanket
JB dressed in panties too big for her
PR claimed never to have seen panties (police later found evidence she had recently bought them for 12 year old niece, but JB wanted them)
Coroner’s report
usan Smith drowned her two young boys, just as thousands of parents have murdered their own children, and countless fathers have molested their daughters.Such brutality does happen, and society’s mindset disregarding such behavior results in more victims.
22
“whoever finds the body is most likely to have killed the person”
“if every bit of evidence is making you look left… take a moment to look right”
Body wrapped in blanket – shame, guilt
Parents don’t kill children… except… Susan Smith (murdered children) – along with many thousands more
Countless fathers have molested their child/children
FBI Report
Susan Smith drowned her two young boys, just as thousands of parents have murdered their own children, and countless fathers have molested their daughters.Such brutality does happen, and society’s mindset disregarding such behavior results in more victims.
23
Basement window entry (myth)
Dispelling intruder myth
25
Dispelling intruder myth
26
A tale of 2 stories
https://xiaoyuannn.wordpress.com/tag/crime/
RULEd in
usan Smith drowned her two young boys, just as thousands of parents have murdered their own children, and countless fathers have molested their daughters.Such brutality does happen, and society’s mindset disregarding such behavior results in more victims.
28
Case against JR
“The call would not have been made if both were collaborating on the staging of a kidnapping, because that call effectively nullified that staging. Why go to all the trouble of writing a long ransom note and then bring the police into your home while the kidnap victim is still inside? By the same token, if Patsy wrote the note and John was innocent, she would certainly have not wanted to make the call and would have seriously resisted, insisting it was too dangerous and calling his attention to the threats in the note. And if shed resisted, and John nevertheless wanted the call made, I see no reason why he would not have made it himself.”
RULED IN
usan Smith drowned her two young boys, just as thousands of parents have murdered their own children, and countless fathers have molested their daughters.Such brutality does happen, and society’s mindset disregarding such behavior results in more victims.
29
Case against JR
“Thus:
Fact: no intruder, telling us this must have been an inside job.
Fact: Patsy Ramsey is the one who called the police, telling us she could have known nothing about the staging clearly implied in the note.
Conclusion: John Ramsey and John Ramsey alone must be the guilty party. Case solved.”
RULED IN
usan Smith drowned her two young boys, just as thousands of parents have murdered their own children, and countless fathers have molested their daughters.Such brutality does happen, and society’s mindset disregarding such behavior results in more victims.
30
A tale of 2 3 stories
https://xiaoyuannn.wordpress.com/tag/crime/
Paper for ransom note used from Ramsey kitchen
At least 1 previous ransom note attempt made
“Mr and Mrs│”
Pen used (and replaced) from pen holder under kitchen counter
Why?
The Ransom note
The Ransom note
“Listen carefully!”
“foreign faction” – foreign?
Correction “we do respect…” – change mindset?
Misspelling “bussiness” “possessions” (but correct ‘attaché’ ‘deviation’)
“We have your daughter in our possession” – “in our possession” – understood and unnecessary
$118,000 – the exact bonus JB had for xmas
“your account”
“be rested”
“she dies” (not “she will die”) – and no exclamation point
“And, hence” (doesn’t make sense… but PR uses it in xmas cards)
Mr Ramsey John
SBTC
The Ransom note
Asked one of the police officers present in the morning:
“have they brought in the cadaver dogs yet?”
Why ask for dead-body-dogs?
PR quotations
On Dec. 27, 1996, Patsy Ramsey, exhausted and lying down, reached up and touched the face of a friend, Pam Griffin, the woman who had made JonBenet’s pageant costumes. Griffin thought Patsy was delirious when she asked, “Couldnt you fix this for me?” as though a sewing machine could bring back her daughter. She then remembers Patsy saying, “We didnt mean for this to happen” and Griffin got the definite feeling that in her weakened condition, Patsy had revealed that she knew who the killer was.
PR quotations
“you know, America has just been hurt so deeply with the tragic things that have happened. The young woman who drove her children into the water, and we don’t know what happened with the O. J. Simpson – and I mean, America is suffering because (people) had lost faith in the American family.
We are a Christian, God-fearing family. We love our children. We would do anything for our children”
PR, during Janary 1st, 1997, CNN interview
PR quotations
Steve thomas
usan Smith drowned her two young boys, just as thousands of parents have murdered their own children, and countless fathers have molested their daughters.Such brutality does happen, and society’s mindset disregarding such behavior results in more victims.
38
A tale of 2 3 4 stories
https://xiaoyuannn.wordpress.com/tag/crime/
Burke Ramsey
The golf bag that was asked to be removed – belonged to BR
Parents never woke BR – but he’s heard on police 911 call
History of abuse towards sister (including hitting her with a golf club)
Fingerprints on pineapple bowl and tea glass
PR serves pineapple to BR (though denies contact)…
Burke Ramsey
The taser marks…
Burke Ramsey
Burke Ramsey
43
Interview, 26th December
No concern for sister
Continues eating sandwich…
DSS Psychologist interviewed BR: “shows little emotional connection with family”
BR: “I feel safe at home” – after an intruder broke in?
Dr Bernhard (psychologist) took a sip from BRs soda cup – BR ‘bristled’ and indicated he could not drink from it anymore…
Playing ‘Guess who’ – BR flips down a face, realises mistake, and says “oops, you’re not dead yet”
BR leaves JB our of portraits (school friends include her – normal for grief). Dad in plane (small distant), mother smaller than BR
Burke Ramsey
Report
“Flat, unemotional affect, closed down, and difficult to draw info out of
Not sociopathic – behaviour more typical of ‘dysfunctional environment’
Psychologist asked BR if he knew what happened
BR - thought she was struck over head (and imitated the exact overhead blow as he said it)
Perhaps she was stabbed
Never mentions she was strangled (though he knew by that point)
What he did NOT know was that she had received a head trauma – the autopsy had not come back yet
Burke Ramsey
Report
Paughs (PR parents) bought PR/JR books on:
The hurried child – growing up too fast
Children at risk
Why Johnny cant tell right from wrong
No evidence for parental sexual involvement…
USA Stats on child murders
1996: 16 murders by boys <10 years old
1996: 61 forcible rapes committed by boys <10 years old
Sexual behaviour problems
JonbenÉt Ramsey (1990-1996)
https://xiaoyuannn.wordpress.com/tag/crime/
Criminal Behaviour CRM203
Dr David Keatley
Senior Lecturer in Criminology
Chair of Crime Science
Director of Researchers in Behaviour Sequence Analysis (ReBSA)
Director of Cold Case Review
Lecture 1: Introduction
1
1
Lecture Overview
Course overview
Assessments
What is Criminal Behaviour?
2
2
Assessment 1: Essay
Title: Evaluate the claim “we can predict who will become a criminal”.
Due Date: 1st October, 2021, 5pm.
Max. word count: 1500 (not including reference list or tables etc)
THIS IS A REVIEW OF RESEARCH LITERATURE
Articles (to get you started)
Herrenkohl, T. I., Jung, H. J., & Lee, J. O. (2017). Effects of child maltreatment, cumulative victimization experiences, and proximal life stress on adult crime and antisocial behavior. Summary Report for US Department of Justice.
Keatley, D. A., Golightly, H., Shephard, R., Yaksic, E., & Reid, S. (2018). Using behavior sequence analysis to map serial killers’ life histories. Journal of interpersonal violence, 0886260518759655.
Monahan, J. (1984). The prediction of violent behavior. American Journal of Psychiatry, 141(1), 10-15.
3
3
What is (criminal) Behaviour?
4
4
How do we measure behaviour?
(and how do we apply this in real world?)
5
5
What is Crime?
Where do we get our knowledge/understanding of crime from?
6
6
Criminal Statistics
Where do we get our stats from?
Official sources, mostly police and courts.
Do these reflect the actual level of crime?
Probably not
7
7
Criminal Statistics
There is no universal, standard categorisation scheme for crime
Different sources/assessments give different data
Theft and property crimes = majority
British Crime Survey
Police recorded crime
8
8
Criminal Statistics: Sources
Source
Benefits
Limitations
Surveys
of general population
Researcher
controlled;
Incl. events
not in
court/reported
Recall;
accuracy;
exaggeration; low response
rate; ethics
Police stats
Better evidence?;
systematic?
Reporting bias; reported
vs
recorded;
Court
stats
Validity?
Accessible?
Prosecution
vs
no
charge
Prison
Stats
Breakdown of
criminals/crimes;
Biases in sentencing;
change in policy and law;
validity?
General population
offender
surveys
Random sample;
overcome police and
court limitations
Bias (serious
criminals
arrested); deception
9
9
Task: Was there a robbery?
Case 1
Man and woman talking for approximately 10 seconds…
Man walks away
Case 3
Man and woman talking for approximately 10 seconds…
Man runs away
Case 2
Man and woman talking for approximately 30 seconds…
Man walks away
Case 4
Man and woman talking for approximately 30 seconds…
Man runs away
10
10
Task: Was there a robbery?
Langsdale and Greenberg (2006)
Man running after 10 seconds more likely to be a crime than if ran after 30 seconds
Walking away = less chance of crime?
In real life, this may be the difference
between a crime being reported or
not
“interpretive processes”
Remember those ‘shuffling bodies’ – context is important!
11
11
Reporting of crime: Usefulness
Limited usefulness in limited circumstances
Result of complex social and cognitive processes
That we need to be aware of!
Problems of source, nature, and interpretation of data
There are three kinds of lies:
Lies, damned lies, and statistics
(Mark Twain [maybe])
12
12
40\% of crime is reported
What is likely to be reported? Why?
What is least likely to be reported? Why?
Who is likely to be reported? Why
Who is likely to report? Why
13
Using official statistics
Crime definitions vary between and within jurisdictions.
Crime statistics do not reflect the actual level of crime.
Most of what we know about offenders comes from those who are adjudicated
Are these adjudicated offenders a reasonable representation of offenders; a representative sample?
What does it mean?
14
Victimisation Surveys
Another method of measuring crime is through victimisation surveys.
Victimisation surveys are regularly conducted in many jurisdictions. In Australia, the Australian Bureau of Statistics publishes these.
These figures confirm that not all crime is reported and not all reported crime is recorded
15
Victimisation Surveys
Probably an underestimate because:
Some people are difficult to survey (children, remote communities, people who live with the offender)
Some people do not know they have been victims
But are useful because they give a better/different picture and they can investigate why some crimes are not reported
16
Self-Report Measures
Another method is to simply ask a representative sample about their offending.
Turns out there is much more crime than we thought – seems we are all criminals
17
Using Crime Statistics
Crime statistics are used in a range of areas such as testing criminological theories, evaluation of the criminal justice system, setting criminal justice priorities and forecasting.
You need to be aware of two key (related) issues
Ecological fallacy
Distinction between incidence and prevalence
18
Ecological Fallacy
Making judgements about an individual based on aggregate data
For example, low income areas have higher rates of crime than high income areas
You might infer that low income individuals commit more crime
BUT higher income individuals who live in low income areas tend to commit more crime AND low income individuals in high income areas tend to commit less crime
19
Prevalence and Incidence
Need to distinguish between incidence and prevalence
Prevalence refers to the number of offenders in a given area over a given time.
Incidence refers to the number of offences committed by offenders in a given area over a given time.
Crime rate refers to the number of offences in a given area over a given time.
20
Prevalence and Incidence
Area A has 3,000 burglars per 100,000 who commit 2 crimes per year giving a crime rate of 6,000 burglaries per year
Area B has 1,000 burglars per 100,000 who commit 7 crimes per year giving a crime rate of 7,000 burglaries per year
21
Correlations!!
Mostly our knowledge of crime is based on correlations
Correlations: crime and poverty are correlated. What does this mean?
22
Correlations!!
Mostly our knowledge of crime is based on correlations
Correlations: crime and poverty are correlated. What does this mean?
Very few randomised control studies
Why?
23
Correlations!!
Mostly our knowledge of crime is based on correlations
Correlations: crime and poverty are correlated. What does this mean?
Very few randomised control studies
Why?
24
Correlations!!
Mostly our knowledge of crime is based on correlations
Correlations: crime and poverty are correlated. What does this mean?
25
What does it all mean?
Our data are not very good:
Not random samples, especially for some offences. Why does this matter?
Crime statistics are poor.
Crime statistics can be difficult to interpret. Does increasing crime rates mean increasing crime? Why is there Indigenous over-representation in prisons?
26
Question: What are the chances?
On my walk to work today, I saw a car with the licence plate: CR1ME P4YS
27
27
Court proceedings:
There has been a hit and run accident at night involving a taxi cab. The only eyewitness identified the taxi cab as being blue. There are two taxi companies operating in the city. One company has green cabs which make up 85\% of the total cabs in the city. The other company has blue cabs, comprising the remaining 15\% of taxis.
Why does it even matter?
-Researcher-Practitioner-
The eyewitness was tested by the court under similar night time conditions and was able to accurately distinguish the colour of cab 80\% of the time.
What is the likelihood that the eyewitness correctly identified the cab as blue?
28
Why does it even matter?
-Researcher-Practitioner-
People frequently estimated the likelihood of proper identification of the cab at 80\%, consistent with the eyewitnesses demonstrated reliability.
Even those who attempted to calibrate a more accurate estimate judged that the eyewitness would be correct over 50\% of the time.
The reality is that given the underlying percentages of cab colours (only 15\% are blue), the eyewitness is likely to be incorrect in their testimony nearly 60\% of the time. That is, they are more likely to be wrong than right! taxis.
Source: Tversky and Kahneman (1982)
29
Why does it even matter?
-Researcher-Practitioner-
30
Why does it even matter?
-Researcher-Practitioner-
CRIME RATES
“theft increases 50\%”
Shock, horror, panic… 50\%... Help!!! RUN..
But wait… 50\% … OF WHAT????
31
Why does it even matter?
-Researcher-Practitioner-
“theft increases 50\%”
That sounds a lot, so let’s call it an increase of 2\% and sleep easy
Imagine: 4 crimes last year…
50\% (relative) and a 2\% (absolute) increase both = 6
32
cf. Spousal homicide
Final thoughts…
You can make Criminology better (and I want you to)
Behaviour is not easy to define (let alone measure)
Beware statistics
33
Criminal Behaviour CRM203
Workshop 3: Profiling
1
Lecture Overview
The Art of profiling
FBI
Blunders
The science of profiling
Geographic
Statistical / ‘Investigative’
2
Science vs Art
Art
Science
3
In the beginning…
James A. Brussel (1956)
Psychoanalysis profile of New York Bomber
“heavy”
“middle-aged”
“male”
“single”
“living with a sibling”
Convincingly accurate picture of:
Suspect: George Metesky
4
Modus Operandi
The particular way in which a person performs a particular task
“the offender’s actions during the commission of a crime that are necessary to complete the crime (Keppel et al., 2005).
THESE ARE NOT FIXED
(some criminals change, some adapt…)
Examples
Type of restraint used, wound patterns, fibre of restraint
Type of weapon used (knife, blunt object, gun)
Tape/binding (hands, mouth, eyes)
Tools to gain entry to home
Time of day (practical considerations)
Lack of fingerprints: gloves used (forensic knowledge?)
5
Signature
‘a distinctive action or characteristic’
Actions or behaviours at a crime that are idiosyncratic or characteristic of the killer ~ feeds emotional or psychological needs of criminal
FIXED AND UNCHANGING (but may evolve)
Signature linked to criminal (see patterns, connect crimes)
Examples
Level of injury (minimal or excessive)
Specific location or sequence of criminal act
Ejaculation, urination, and/or defecation at crime scene
Specific type of weapon used
Personal items taken from victim
Specific victim targeted (race, age, profession, physical characteristics)
Anything specifically left at crime scene (note, mark, object)
6
Profiling
‘Behaviour is exhibited at a crime, or a series of similar crimes, and studying this behaviour allows inferences to be made about the likely offender’ (Jackson & Bekerian, 1997)
Homant & Kennedy (1998) - 3 main types:
Crime Scene Profiling – info at crime scene
Offender Profiling – collection of data, aggregate of those involved in particular
crimes
Psychological Profiling – personality tests, interviewing etc. to assess which
individual fits known personality template
Davies (1997)
‘constructing a hypothetical picture of a perpetrator of a crime on the basis of data from the scene of the crime, witness statements, and other valuable information’
7
Case Study: Jack the Ripper
‘How many victims? (11, 6, 5)
Keppel et al. “6 based on
signature of crime”
8
Case Study: Jack the Ripper
Look away….
Martha Tabram?
Face up
Clothing disarranged
Exposed lower part of body and genitals (legs wide open)
Killed on the spot (no dragging)
Body found 4.45am, 3 hours after killing
Known prostitute, heavy drinker
36 years of age
39 stab wounds (left side, and genitals; 17 to breast, 13 in lower body)
Wounds to: neck, liver, spleen, stomach
All wounds inflicted before death
9
Case Study: Jack the Ripper
Look away….
Mary Jane Kelly
Face down, indoors
Mutilation (nose, ears removed); flesh removed
Heart missing
Organs placed around room
Uterus and one breast placed under bed
Vulva and right buttock removed
Some mutilation occurred after death
10
Case Study: Jack the Ripper
Similarities
Prostitutes 24-45
Once they lifted clothing, strangled and lowered to ground
Usually heads facing to left
Attacks at night (midnight-6am)
All took place within 2.6km
Sequentially 1.6km
Found where killed
Sharp, long bladed knife
Differences
Martha stabbed from front, others behind (less blood/detection?)
Outside to inside (detection? Interruption? – increase mutilation)
11
Case Study: Jack the Ripper
Signatures
Picquerism – sexual pleasure obtained from cutting or stabbing
Submission of victim – Multiple wounds to incapacitate not immediately kill
Overkill/domination – excessive attacks
Degradation – leaving bodies in public places (Invincible? Authority? Ego?)
Posing of body – sexually revealing
Escalation of violence – more extreme over time
Planning - no evidence left “organised serial killer”
Signature only useful if it reveals very idiosyncratic behaviours; Keppel et al. compared these to database – how many matched?
0.03\%
12
Find the offender
Offenders home
Crime location/scene
Rape in park
7am, 21yr old jogger, attacked from behind; gagged, blindfolded, forced to wear tights,
Description: 20-25 hooded, sweatshirt, sandy blonde hair,
*04/03/02
Rape / Murder
Battered in home
Foreign object inserted
Description: EWT: red delivery van - fridges
*28/03/02
Burglary
Estate/halls of residence
Computer/mobile/ CDs taken
*28/01/02
Robbery
Post office; handgun; threatening lang.
Single offender
Computer/mobile/ CDs taken
*10/10/99
Robbery
Post office; 10am; lone offender; handgun; threaten to shoot customers
EWT: young, muscular
*10/10/01
Scale: 1 in. = 1mile
Norman
16, single, lives alone, psychiatric history: indecent exposure x1; thin, blonde hair
Dave
35, married w .kids, juvenile record of theft, adult burglary x10; bald
Mike
46, single, rape (child 12), indecent assault (child), indecent exposure, schizophrenic, balding dark hair
Jake
Married w. kids, robbery, Dom. Violence, knows Michelle
Jerry
57, married w. kids, Dom. Violence, no preconvs, dark hair, blue eyes
Damen
28, w. partner, drink driving, Dom Violence, balding
Quentin
42, unmarried, drugs, drunk & disorderly, depression
Mark
50, w. partner, chronic sex offender (children), unemployed
Nils
25, single, rape, blonde, construction worker, frequents bondage clubs
Alan
21, single, indecent exposure x 12, blond, slim, blue eyes
Source: Alison & Eyre (2009)
The key here is to find out who the suspect is – students are to work their way through each suspect debating which they think is the most likely.
“Time to profile”
Artistic impressions
14
Blunders
Rachel Nickell
15th July 1992
Walking with her son on Wimbledon Common
Brutally stabbed and sexually assaulted
Killer profiled
No evidence at time
“Operation Ezdell” –
Undercover policewoman
Series of letters and meetings
Psychological ladders to climb
15
Blunders
Paul Britton:
Potential for investigations to be misled by profilers:
“if this had happened in a murder or rape investigation, then someone else could have died or been attacked”
In relation to Rachel’s murderer:
“It is almost inevitable that this person will kill another young woman at some point in the future…”
16
Blunders
C.S.
“Rachel’s killer could have been sitting opposite, borrowing my salt and pepper, and I wouldn’t know him or recognise him….
…if he came into my consulting room and I learned all of the details of his sexuality, I would know immediately that he was likely to have killed Rachel Nickell, without him mentioning it”
“the sexual fantasies in the killer are so rare, that the chances of two such rare individuals being on Wimbledon Common at the same time are ‘vanishingly small’…”
17
Blunders
Robert Napper
The murderer of Rachel Nickell, July 15th 1992…
And Samantha Bisset…
in November, 1993.
and her four year old daughter
18
Classic Classification of Behaviours
ORGANISED
DISORGANISED
Personal Characteristics
Sexually
competent
Lives with partner
Has charm
Low intelligence
Unskilled
Lives alone
Poor personal hygiene
Post offense behaviour
May move body
Police ‘groupie’ /follower
May turn religious
May change job
Recommended
Interview
technique
Direct strategy
Accurate
details
Show empathy
Interview at night
19
Classic Classification of Behaviours
Organised
Disorganised
Average
-
above IQ
Socially Competent
Skilled work preferred
High birth
-
order
status
Father’s work stable
Sexually competent
Inconsistent childhood discipline
Controlled mood during crime
Use of alcohol with crime
Precipitating situational stress
Living with partner
Mobility (car in good condition)
Follows crime in news media
May change job or leave town
Below
-
average IQ
Socially
inadequate
Unskilled work
Low birth
-
order
statis
Father’s work unstable
Sexually incompetent
Harsh discipline as a child
Anxious mood during crime
Minimal use of alcohol
Minimal situational stress
Living alone
Lives/works near crime scene
Minimal interest in news media
Significant behaviour change
Profile Characteristics
20
Classic Classification of Behaviours
Organised
Disorganised
Planned offense
Victim a targeted stranger
Personalises victim
Controlled conversation
Crime scene reflects control
Demands submissive victim
Restraints used
Aggressive acts prior to death
Body hidden
Weapon/evidence absent
Transports victim or body
Spontaneous offense
Victim/location known
Depersonalises
victim
Minimal conversation
Crime scene random and sloppy
Sudden violence to victim
Minimal use of restraints
Sexual acts after death
Body left in view
Weapon/evidence often present
Body left at death scene
Crime Scene Characteristics
21
Homology Hypothesis
Underlying basis of FBI profiling
Crime scene characteristics
Offender characteristics
Offender characteristics
Crime scene characteristics
Convergence – support for homology hypothesis
Divergence– no support for homology hypothesis
Characteristics of offender reflected in characteristics of crime scene
Crime scene can be effectively categorised
Offender’s crimes tend to show characteristic patterns
22
Crime linkage approaches
Linkage
Matching
Consistency between crime scenes and characteristics
Characteristics of 1 offender’s crime scene
Characteristics of same offender’s other crime scenes
Characteristics of crime scene
Characteristics of particular offender
Groups of crime scene characteristics
Characteristic traits of the offender
Homology
23
Crime linkage approaches
Part of the “Timeline Toolkit”
24
YOUR TURN: Profile this case
Victim: Nude female
Found 3pm, left for work at 6.30am
Location: Roof of apartment block she lived in
26 yr old, 90 pounds weight, spinal deformation
Not dating anyone
Both nipples removed and placed on body
Face severely beaten
Throttled with strap of her bag
Blunt instrument caused many face fractures
All items used came from her bag
Phrase “you can’t stop me” written in ink on inner thigh; “fuck you” on torso
Pendant she usually wears was missing
Victims underwear taken down and pulled over face
Stockings tied around hands and ankles
Pen and umbrella inserted into vagina
Comb stuck in pubic hair
No semen in victim’s vagina (ejaculation on body from standing position)
Bite marks on thighs; various bruises and lacerations over body
Faeces from murdered found close by (covered by victim’s clothes)
No evidence of similar crimes being carried out in local area
25
White man
Aged 25-35
Alcohol/drugs not material factors
Any dates would be younger (controlled and dominated more easily)
Average intelligence (dropped out of education)
Difficulties in personal relationships
Disorganised – confused, perhaps mental difficulties
Fit into context well – might reside there, or employed there
Never married
No military background
Possibly unemployed
Sexual fantasies – possibly has/uses sadistic pornography
Sexually inexperienced/inadequate
Unskilled or skilled occupation
Actual Profile
26
The links…
Killers similar age and race to victims
Fantasy embedded at core of extreme cases
Fantasy as blueprint
‘trophy’ taking (pendant) indicates future fantasies
Little evidence crime prepared for (disorganised, using victims belongings)
Clearly sexual crime, but used substitutes, suggesting inadequacies (so likely never married)
Elements of control and domination (bound/blindfolded)
Lived near/knew the area: took time, knew no risk of being caught
OUTCOME
Father lived in apartment
Released from mental hospital (light security)
Bite marks linked him
27
Is profiling common sense?
Snook et al. (2007)
Systematic review
130 articles
‘sources of knowledge’ – common sense rather than science
Hindsight bias, illusory correlates, availability heuristic, post hoc ergo propter hoc (after this, because of that)
US more common sense than UK…
FBI lacks scientific approach and rigour
FBI = “smoke and mirrors”
28
Does profiling work?
Does it work?
Would you recommend it?
Is common sense enough?
What are the risks?
Police still use inaccurate profiles (and ‘like’ them). WHY?
What behaviours do we look for?
Is absence of evidence, evidence of absence?
29
PROFILE HADDEN CLARK
30
WAIT!!! You have an activity
31
Think about where you live
Imagine the surrounding area
(plot some main features – roads, shops, village greens etc.)
32
Science vs Art
Art
Science
33
Now plot a murder… and a 2nd… and a 3rd… and a 4th
STOP!
34
Investigative psychology
Activity
Put a dot in the middle of the page – that represents your home
Imagine the surrounding area (plot some main features)
Investigative psychology
Activity
Put a dot in the middle of the page – that represents your home
Imagine the surrounding area (plot some main features)
A
B
C
D
E
F
G
H
1 2 3 4 5 6 7 8 9 10
Where does the killer live?
Investigative Psychology
David Canter
First crimes tell us most about criminal
Location – closer to home to begin
Routine Activity Theory
Geographical Profiling
Statistical Profiling
37
Investigative Psychology
First Crimes (Routine Activity Theory)
Relationship between criminals daily activities and the crimes committed
Habits
Crimes from everyday opportunities combined with
1) suitable target
2) minimal risk of being detected
3) potential offender available
38
Investigative Psychology
Geographical Profiling
Offender is likely to live in central area
The further from the centre, the less likely to offend
Relatively few offences in outer rings
39
Find the offender
Offenders home
Crime location/scene
Rape in park
7am, 21yr old jogger, attacked from behind; gagged, blindfolded, forced to wear tights,
Description: 20-25 hooded, sweatshirt, sandy blonde hair,
*04/03/02
Rape / Murder
Battered in home
Foreign object inserted
Description: EWT: red delivery van - fridges
*28/03/02
Burglary
Estate/halls of residence
Computer/mobile/ CDs taken
*28/01/02
Robbery
Post office; handgun; threatening lang.
Single offender
Computer/mobile/ CDs taken
*10/10/99
Robbery
Post office; 10am; lone offender; handgun; threaten to shoot customers
EWT: young, muscular
*10/10/01
Scale: 1 in. = 1mile
Norman
16, single, lives alone, psychiatric history: indecent exposure x1; thin, blonde hair
Dave
35, married w .kids, juvenile record of theft, adult burglary x10; bald
Mike
46, single, rape (child 12), indecent assault (child), indecent exposure, schizophrenic, balding dark hair
Jake
Married w. kids, robbery, Dom. Violence, knows Michelle
Jerry
57, married w. kids, Dom. Violence, no preconvs, dark hair, blue eyes
Damen
28, w. partner, drink driving, Dom Violence, balding
Quentin
42, unmarried, drugs, drunk & disorderly, depression
Mark
50, w. partner, chronic sex offender (children), unemployed
Nils
25, single, rape, blonde, construction worker, frequents bondage clubs
Alan
21, single, indecent exposure x 12, blond, slim, blue eyes
Source: Alison & Eyre (2009)
This is the reveal – might be worth deleting this if you hand out slides to the students before the session, as otherwise they can look ahead.
Investigative Psychology
Snook et al. (2005)
German serial killers
Killed average 4.6 times
63\% murders – killer lived within 10km of where body found
Younger killers travelled less far
Killers with higher IQ travelled further (avoid detection? Bigger mental maps? Better travelled?)
41
Investigative Psychology
Snook et al. (2005)
BUT
Questionable whether initial killing is best indicator of where killer lives
Averages (means) can be misleading…
Mean distance between killer’s home and body site = 19miles
Median distance = 5miles
Some killers travelled a very long way (though very few in excess of 62 miles).
42
Investigative Psychology
Bennell & Canter (2002)
Stability in offenders choice of crime site locations – useful for identifying linkages
Linked burglaries tend to occur close together
0.7km cut-off = 52\% linked, 93\% unlinked correctly identified
2.5km cut-off = 62\% linked, 68\% unlinked correctly identified
Great care needed when setting cut-off/boundary points
Bennell & Jones (2005)
Commercial and residential crimes better linked by this method
43
Investigative Psychology
Smallest space analysis
A form of complex statistics analysis used to identify underlying patterns of characteristics of a crime scene
How likely are features of a crime to exist and coexist with other features (if I see ‘x’ will I see ‘y’?)
Group behaviours
‘Clusters’ of crime types/MO etc.
Can analyse patterns
over time
44
Investigative Psychology
Crime Scene Characteristics
45
Investigative Psychology
Quick guide…
Murder A Murder B Murder C
Multiple Weapons 1 1 2
Sexual humiliation 1 1 2
Night-time 2 1 2
Left naked 1 1 2
Note: 1 = yes; 2 = no
Murders A and B = similar
3 out of 4 characteristics found
46
Investigative Psychology
Multiple weapons Sexual Humiliation Night-time Victim left naked
Multiple Weapons
Sexual humiliation 3
Night-time 2 2
Left naked 3 3 2
Matrix of correspondence to see which of the four facts co-occur
Complete agreement on ‘multiple weapons’ and ‘sexual humiliation’ across 3 murders
Scores can be represented in ‘state space’
This takes some time to get your head around, and I usually have to go forwards and backwards a few times to show where these numbers come from
47
Investigative Psychology
Smallest Space Analysis
3 (multiple weapons; sexual humiliation; victim left naked) are in the same space as they all co-occur the most
The remaining facet (night time) is 1 away
Occurs in multidimensional space (villages equally close, one 1km from all etc.)
Multiple weapons
Sexual humiliation
Victim left naked
Night-time
Distance = 1
48
Investigative Psychology
Smallest Space Analysis
49
In sum
Is profiling an art?
Is profiling a science?
Can it be both?
WHY.
What are some of the limitations of each?
50
PROFILE YOUR OTHER SERIAL KILLER – discuss in groups, feed back
How useful is profiling?
51
Criminal Behaviour CRM203
Workshop 1: Developmental
& Biological
INSERT YOUR INFO HERE
1
1
Matters arising
Essay title vs Essay focus
Referencing
Forums (look around you…)
AoB (start messaging in now)
2
‹#›
2
Workshop Overview
Case study
Perspectives and Approaches
Factors associated with criminal behaviour
How to measure developmental criminal behaviours
3
3
Case Study: John
Childhood (0-10): Generally ‘good’, no signs of truancy, no irregular behaviours, seemed to be social (had friends), enjoyed school, played with siblings (2 brothers)
Youth (10-13): Changes noticed, mostly minor (vandalism and anti-social behaviours) in the neighbourhood, began hanging around with a ‘tough crowd’
Teenage: Progression of crime, stealing from shops, throwing rocks from bridges (at cars passing beneath), began getting into fights
Adult: Continued violence, escalating to fights in local clubs.
Arrested: murder with knife, age 20
4
4
Case Study: John
What questions do you have about John?
What do you need to know?
Is this progression typical?
Could it be stopped?
5
5
Why study developmental risk factors?
The study of developmental risk factors offers potential strategies for early intervention.
One of the frustrating aspects of criminology generally is that most of our data is correlational
This means that we have limited cause and effect data.
For instance, how can you prove poor parenting causes crime? How can you show the effects of peer group on crime?
6
6
Cumulative Risk Model
NOTE: Systems Approach
A number of risk factors build towards a criminal career development
Predicts negative emotional and mental health outcomes
Focus on harmful environmental, psychological, and social influences
Emphasises identification of children confronted by multiple risk factors as priority for intervention
Age (life history)
Number of risks
As risks increase across life
so does the chance of being a
criminal… (but is it additive?)
7
7
Developmental Cascade Model
NOTE: Systems Approach (again)
AKA ‘Dynamic Cascade Model’
Interactive approach – between risk factors
Also, individual differences taken into account
Factor A
Factor B
Factor C
Crime
8
This is ‘standard’ Psychology -and is not very good… at all!
8
What are the ‘factors’
Multiple (more than listed here)
Broadly: Social, Familial/parenting, Psychological
REMEMBER: they interact
9
9
Social I: SES
Socio-Economic Status (SES)
Poverty and crime = closely correlated (especially violent crime)
BUT, this is correlational
The overwhelming majority of low SES are not offenders
What does this mean?
How do poverty and crime interact?
10
10
Social II: Peer Rejection
Not all peer rejection is a risk factor (i.e., Individuals with ASD –heightened peer rejection, but decreased risk of crime)
Peer rejection based on aggression appears to be a significant risk factor
11
11
Social III: Anti-Social Peers
Social Learning Theory – plus conformity, influence, and later indoctrination/radicalisation
Can stem from rejection – rejected individuals group together…
12
12
Social IV: School Problems
In addition to the bullying issues, truancy, failure, being held back, and poor reading skills (i.e., academic failure) are predictors
Note the importance here of parenting
13
13
Social IV: School Problems
In addition to the bullying issues, truancy, failure, being held back, and poor reading skills (i.e., academic failure) are predictors
Note the importance here of parenting
14
14
Familial / Parenting
Family variables are consistently found to be predictors
Parenting including poor supervision/ monitoring; erratic, non-contingent; harsh rejection; low involvement; punitive discipline without reasoning.
Other factors include disruption, criminality, size. Strong link between family violence and subsequent violence
15
15
Familial / Parenting
Family dysfunction is a very stable and strong predictor. Includes criminality, family violence, alcohol and other drug (AOD) problems, abuse and neglect
Other factors include disruption and family size.
Strong link between family violence and subsequent violence
Adverse childhood experiences are also risk factors and are essentially familial
16
16
Adverse Childhood Experiences
ACEs are associated with a wide range of health and well-being problems including criminal behaviour
Physical abuse
Sexual abuse
Emotional abuse
Physical neglect
Emotional neglect
Intimate partner violence
Mother treated violently
Substance misuse within household
Household mental illness
Parental separation or divorce
Incarcerated household member ….
17
17
Psychological
In addition to the social and familial factors intra-individual factors have also been identified
Attachment is a factor but with the caveat that it is likely that it is not directly linked but operates through other factors
Multiple Psychological Factors
Empathy
Developmental Disorders
Intelligence
18
18
Psychological: Empathy
Empathy is a problematic concept
Entails emotional and cognitive empathy
Absence of emotional empathy seems to be a risk factor
Links to animal cruelty…
Again, operates through other variables
BEWARE: talking about ‘psychopathy’ (in relation to empathy)…
19
19
Psychological: Developmental disorders
Hyperactivity, impulsivity, attention deficit is a predictor
As you will note, impulsivity is one of the major personality characteristics of Life Course Persistent (LCP) criminals
It is likely to be in part a biological/genetic predisposition compounded by environmental circumstances
20
20
Psychological: Intelligence
Low intelligence is predictive.
May be due to subsequent school failure & lack of attainment & isolation that is, a socialisation process.
Alternatively, may be related to poor abstract reasoning (necessary for impulse control, consequential thinking, planning & possibly empathy)
21
21
Bartol & Bartol: Table 2-3
Social Parental/Familial Psychological
Poverty Single-parent household Lack of empathy
Early peer rejection Permissive or lax parenting Attachment disorder
Association with anti-social peers Minimal parental monitoring Animal cruelty
Inadequate pre-school child care Parental psychopathology Cognitive / Language deficits
Inadequate after-school child care Abuse Low IQ
Academic Failure Domestic violence / substance abuse ADHD etc.
Anti-social siblings
Beware biological issues (see next week!)
22
22
HINT: this is a good chance to ask me anything
23
23
How do we measure development?
24
24
Longitudinal studies
Longitudinal research is also known as the criminal careers approach.
Tries to link human development sequences to the development of criminal behaviour.
Tries to find predictors or behaviours which might predict criminal behaviour. These behaviours might be criminal, anti-social or neither.
25
25
Criminal Careers
We now understand that there are different factors which operate on:
Onset
Persistence
Escalation
Desistance
26
26
Life Course Persistent
The longitudinal research has demonstrated that criminal conduct is evident in early life, that these individuals account for a substantial amount of crime, that they have a long criminal career and that there are very few late entrants
These individuals have been described as LCP as opposed to the Adolescent Limited offenders who will stop offending after early adulthood.
We are interested in the LCP offenders
27
27
New methods for measuring life course / history of criminals
28
28
Crime Script Analysis
Behaviour Sequence Analysis
29
29
Crime Script Analysis
Comes from ‘Script Analysis’ in Cognitive Psychology
How do you navigate a restaurant?
30
30
Crime Script Analysis
In the same way we have ‘restaurant’ scripts, criminals have ‘crime’ scripts…
31
31
Crime Script Analysis
These can be applied to specific crimes
(i.e., bombings, rape, homicide),
Examining active shooter events through the rational choice perspective and crime script analysis (Osborne & Capellan, 2017)
Pathways in Crime… (Keatley, 2018);
32
32
Crime Script Analysis
… or they can be applied to life history events and risk factors
Understanding school shootings with crime script analysis (Keatley, Mcgurk, & Allely, 2019).
NOTE: this was my 2nd year student!!!
33
33
Crime Script Analysis
Behaviour Sequence Analysis
34
34
Behaviour Sequence Analysis (BSA)
More statistical (sorry)
BUT BETTER (yippee)
35
35
Behaviour Sequence Analysis (BSA)
Episode (i.e., murder, rape, terrorism etc.)
Parse the episode into discrete behaviours/events – YOU define
Code behaviours (e.g., A, B, C…)
We are interested in transitions between behaviours
Analyse sequence of events
AB|BC|C D|EF … JK
A B C D E F G H I J K
36
36
Behaviour Sequence Analysis (BSA)
37
37
Behaviour Sequence Analysis (BSA)
38
38
Behaviour Sequence Analysis (BSA)
Typologies
Behaviours
Childhood
abuse
Keatley, Marono, & Clarke (2019)
NOTE: Abbie started publishing in her first year! She now has ~5+ papers!
39
39
40
40
Temporal Analyses
There are more complex forms (i.e., T-Pattern Analysis)
Very useful (especially in applied cases!)
I’m very keen to collaborate with students! (remember: I want you to improve academia)
41
41
BRINGING IT ALL TOGETHER
Various risk factors have been identified
The problem is that many of these factors are highly inter-correlated so it is difficult to know which factors might be causative
At this stage we do have information on the factors but not on if or how they are causal and how they might be interacting
The up side is that we can intervene at the primary level and this does have an effect
Methods like BSA can show ‘attractors’ / ‘absorbing point’ to intervene and break the flow.
42
42
Criminal Behaviour CRM203
Biological Factors
43
Case Study: Hadden Clark
AKA: the cross dressing cannibal
Serial Killer
Michelle Dorr (age 6) -1986
Laura Houghteling (age 23) - 1992
Early life abuse (see previous week)
So, why the biological factor?
44
Case Study: The Clarks
Bradfield Clark
Jailed in 1985 for killing co-worker Trish Mak
Invited her over for dinner (while partner was out of town)
Brutally beat her, and ate parts of her
Similar Developmental background
Similar Biological background
45
Questions?
How much of their behaviours stem from developmental factors?
How much of their behaviours stem from biological factors?
How would you study this?
What methods would you use?
Nature Vs Nurture
46
Genetic Theories
Earliest positivist explanations of crime suggested a distinct biological/genetic basis to crime
Social Darwinism became a very popular social theory
Influenced eugenics
If people are ‘born’ bad – what does this mean for treatment and intervention?
Minority report?
47
Genetics vs Biology
Genetic disposition or predisposition but also
Acquired deficits (birth trauma, other head injuries, abuse) and poisons causing permanent damage (heavy metal poisoning)
Transient biochemical problems (drugs, hormone imbalances)
48
Genetics Position
Biology implicated in violence
Biological basis could be acquired or genetic or combination
Genetic predisposition but to general offending
Strong interaction effect
49
Genetics Position
Some evidence to suggest certain types of genetic abnormalities are related to criminal behaviour (the XYY syndrome) but the number of this genetic abnormality (found in less than .3\% of the pop.) makes it a marginal area of consideration.
Generally, polygenetic nature and function yet to be reliably explained.
PLEASE NOTE: ‘selfish gene’ does not mean ‘selfish people’.
There is NO ‘gene for…’
Note: this is also where ‘meme’ comes from!
50
Genetics Position
The nature of the genetic effect is difficult to determine: It is either:
a predisposition to act in a manner likely to lead to criminal activity; or
occurs through an intervening process. For example, arguments that suggest that there is a difference in cortical control
If genes ‘code’ for the blanket, try changing just one crease –
Everything is inter-connected
51
Genetics Position
In sum:
Most biosocial scientists would claim that there is some biological predisposition to crime; and
that genetic predisposition can be overcome by some environmental factors.
Not a single gene
Crime is not genetically determined
Genetic research cannot explain individual criminality
Genetic predisposition does not means determinism
Genetic studies need to address environmental impact
52
Research Strategies
The fundamental proposition of the biological approach is that behaviour is, in part, determined by genetic influences.
An alternative (but not inconsistent) proposition is that behaviour is, in part, determined by biological influences.
The aim of this research is to demonstrate either a genetic or biological basis to criminal behaviour.
Is this even possible?
53
Lombroso’s work
Three classes:
Born criminals – atavistic reversions – an evolutionary perspective
Insane – a commonly held belief that only an insane person could commit some of the horrific offences
Criminaloids – no special features but has criminogenic needs
54
Lombroso’s work
Was discredited relatively quickly
Important because he tried to apply
scientific method
used clinical data
recognised multi-factorial explanation
55
Body types…
Sheldon’s (1949) Theory of Body types
Somatotyping
Research consistently points to both juvenile and adult offenders having more mesomorphic body types (muscular) and more mesomorph – endomorph type (muscular & fat) as opposed to the ectomorph types (slight & thin)
Identify the argument for a biological basis to crime (and not the counter)
56
Body types…
Sheldon’s (1949) Theory of Body types
Endomorph: heavy with short arms and legs.
Relatively non-criminal
Mesomorph: athletic and muscular, tend to
be aggressive and apt to commit violent crimes
Ectomorph: thin, introverted, overly
sensitive
DISCREDITED!
57
Physiological factors I
A variety of physiological indices have been found to correlate with criminal behaviour
Toxins – see effects of lead
Alcohol and other drugs
Neurotransmitters
Hormones including testosterone
Autononomic Nervous System activity (~fight or flight)
58
Physiological factors II
A variety of physiological indices have been found to correlate with criminal behaviour
Heart Rate & Criminality
EEG Patterns and Criminality
Hypoglycaemia and Criminality
Hyperactivity
Hemisphere Functioning and Criminality
BEWARE THIS PATH
JUNK SCIENCE LAYS AHEAD
59
HINT: this is a good chance to ask me anything
60
How do we measure (biological) development?
61
NeuroPsychology
Recent advances in neuroimaging have led to research examining different brain behaviours and their relationship with criminal behaviour
This research points to the importance of brain plasticity – that is there is an interaction between gene and environment on behaviour
It shows that environmental factors impact on brain development
62
Brain Plasticity
We now understand that there is considerable interaction between brain development and environmental factors
We also understand that there are negative environments which impact on the development of relevant parts of the brain; and conversely positive environments which impact on the brain.
For example the following impact on the developing brain
In-utero experiences – lead and alcohol
Birth complications increased risk especially with other psychosocial factors
Early trauma such as attachment and victimisation
63
Neuropsychological factors I
There appears to be two areas of the brain which are particularly relevant to the development of criminal behaviour.
The frontal lobe is important for organising thought, planning, self regulation, sustained attention, abstract decision making, self-regulation
and inhibition and thus consequential thinking.
It is important for impulse control.
64
Neuropsychological factors II
The amygdala is important for emotional regulation
Emotional regulation refers to emotional recognition, control and direction
There are sex differences
65
FAST FORWARD
When we examine psychopathy you will note there are key dimensions:
Empathy, callous, unemotional
Poor impulse control
The amygdala is critical for emotional regulation
The frontal cortex is important for impulse control
66
Gene studies
The previous studies indicate that criminal behaviour and certain physiological characteristics are linked but causality is difficult to determine and genetic causality is even more difficult to determine
The following research strategies are aimed at determining a clear gene/behaviour relationship
67
Family studies
Identifies the conviction rates for parents and children. And siblings??
High correlations between criminal father and criminal sons compared to criminal behaviour of sons of non-criminal fathers.
Some studies have tried to control for environment but this is considered practically impossible.
Arguments and counter-arguments?
68
Twin studies
Dizygotic Twins
Fraternal
Two different eggs
Genetically as different as non-twin siblings
Monozygotic Twins
Identical
Same egg
Share same genes
Why important?
69
Twin studies
Assumption: monozygotic and dizygotic twins have same environment but different genes.
Concordance rates: probability of one twin being criminal it the other is also.
RESULTS:
Average concordance rate for MZ is 51.5\% and for DZ 20.6\%.
For most recent studies 31\% v 12.9\%.
70
Adoption studies
These studies try to tease out genes and environment by examining criminal behaviour of children (mostly boys) reared by non familial parents.
You compare criminality of biological parents (ie criminal non-criminal) with criminality of adopted parent and criminality of child.
Results consistently point to genetic predisposition.
EVALUATE ADOPTION STUDIES…
71
In sum
Overall, evidence points to a genetic predisposition to crime.
There may also be a separate biological process occurring.
While no one study is conclusive, divergent studies from different cultures all pointing in the same direction are difficult to dismiss.
The predisposition shows most strongly in adoption studies to be for property crime and not violent crime.
There is probably an interaction effect with genes and environment. Greater criminality is found when both operate and this is greater than their mere addition. This is evident in gene, brain plasticity and domestic violence.
72
Discussion Point
Now you know about developmental and biological factors
Can we predict criminal behaviour?
Is it based on environment?
Is it based on biological?
Is it based on the limitations of our methods?
Are the Clarks the norm, or the exception?
Are the Krays the norm, or the exception?
Questions? (this is it for background theory, from here it gets more applied…)
73
Criminal Behaviour CRM203
Aggression
‹#›
1
Content
Definitional issues
Theoretical Perspectives
Biological Perspectives
Cognitive Perspectives
Media Violence
‹#›
2
Definition
Many definitional problems
Complexity is the difficulty
And the violence–aggression distinction
Is aggression violent?
Is violence aggressive?
What about different types of aggression and violence? (verbal, physical, passive etc.)
‹#›
3
Definition
Aggression is a specific type of social interaction in which one person (the perpetrator or aggressor) acts with the intent to harm another
Note: Don’t be passive listeners
Intent?
Harm?
BRACE YOURSELF
SHOCKING IMAGE FOLLOWING
‹#›
4
What sorts of harm?
Tedeschi and Felson (1994) proposed there are four main types of harm that can underpin grievances:
physical harm (injury, pain, or the threat of);
material damage (loss of goods or services);
psychological harm (lack of respect, fairness or equality);
political harm (violation of rights and freedoms by the state or organisations)
‹#›
5
Thus
Needs to be at least two players and in some cases more
The attributes of those involved in aggression are critical to the observation of aggression.
The social class, gender, age, setting and nature of the relationship are critical to the perception.
Aggression is a social judgment
Reaction to aggression is a social judgement
‹#›
6
Note
Actual violence is not necessary for an act to be aggressive.
Not all aggression results in social disapproval e.g., an aggressive selling technique.
Is armed robbery aggressive, or violent or both or neither?
‹#›
7
Dimensions of Aggression
Direct/Indirect
Active/Passive
Physical/Non-physical
Hostile (anger) versus Instrumental (goal oriented)
Now a continuum from controlled or planned at one end to reactive and impulsive at the other (~psychopathy?)
‹#›
8
Dimensions of Aggression
Proactive Aggression
purposeful, instrumental, goal-directed
linked to reward and punishment processing
Primary psychopathy
Reactive Aggression
response to anger, provocation or threat
linked to basic threat circuitry (FFFS) and regulatory systems (Blair et al., 2005; Blair & Cipolotti, 2000)
Secondary psychopathy
(Reidy et al., 2007; Cima & Raine, 2009)
‹#›
9
So aggression can be…
motivated by anger (from extreme rage to mild annoyance) or
by some calculated thought that someone needs to be harmed to meet some objective
deliberate, hostile, active and physical (and may be criminal)
accidental, instrumental (in protecting oneself), passive or non-physical (and non-criminal)
‹#›
10
Explaining aggression
Theories focus on:
Biological, instinctive or evolutionary basis
versus
Socially learnt or cognitive basis – the thoughts, feelings, behaviour interactions
‹#›
11
Psychodynamic Theory
Two basic and fundamental drives: eros and thanatos - the drive to survive and procreate and the drive to conquer or subdue others.
Natural build up of aggressive impulses (thanatos), need regular discharging, if not reaches dangerous levels and may explode (or become internalised) – the hydraulic explosion
Aggression viewed as an explosion of pent up frustration or anger.
Over control of aggression leads to psychological problems
Discharge of aggression through catharsis: direct or vicarious (thus, theoretically, watching violence leads to a reduction in active violence).
Links to frustration-aggression hypothesis (coming later)
‹#›
12
Psychodynamic Theory
Assumed that acting out aggression in a manner that does not result in harm to others is a positive action since it leads to the release of pent up frustration.
But evidence points to catharsis leading to an increase in violence (does it?)
‹#›
13
Ethological Approach
The theory is largely evolutionary idea that man needs to be aggressive because of a poor design feature – no claws or sharp teeth.
So why was humanity successful?
Because:
We are aggressive
And have opposable thumbs – just like koalas
And make tools
And talk
And think
‹#›
14
Ethological Approach
Programming
Animals (particularly males) biologically programmed to fight over resources
Hydraulic model
In humans, emotional or instinctive pressures, and release is aggression (overlaps Freud’s psychodynamic)
Ritualization
Development of rituals, stylized actions, leading to symbolic / function of communication
‹#›
15
Ethological Approach
Game theory: Hawk-Dove
‹#›
16
Biological Theories
At this stage of limited value because they do not sufficiently explain onset, maintenance, desistence etc
As noted psycho-dynamic interventions based on catharsis can increase violence.
Why?
‹#›
17
Frustration-Aggression
Frustration-aggression hypothesis now the major explanation
Suggests that aggression is an elicited drive
Aggression is a follow-on from frustration
That is, aggression is a drive state that is elicited from our interactions with the world
The drive is based on frustration
Originally: frustrating a goal leads to aggression
‹#›
18
Cusp Catastrophe Model
For everyone that loves Chaos Theory
Butterfly effect (Sensitive Dependence on initial conditions)
Attractors
Bifurcation
Hysteresis
‹#›
19
Re-formulation
Blocking a goal leads to frustration
Frustration leads to anger
Anger pre-disposes aggression
Aggressive acts are dependent upon interpretations, values and repertoires of the individual (your thoughts) and stimuli
‹#›
20
Real World Case Study: INCELs
Involuntary-Celibates
(online) subculture – defined themselves as unable to find romantic/sexual partners.
Desire a partner.
Forums characterised by resentment, misanthropy, self-pity, self-loathing, misogyny, racism.
Can foster/facilitate violence against sexually active people
Growing number of mass murder attacks perpetrated by individuals with INCEL background – most notably Elliot Rodger – Isla Vista attack.
‹#›
21
Research shows
The greater the magnitude of the frustration the greater the aggression.
The greater the degree of interference, the greater the aggression.
Arbitrary frustration increases aggression.
Unexpected frustration increases aggression
The aggression may be directed at the source or may be displaced to other more convenient targets which are somehow related to or represent the obstacle.
Aggression occurs only with the appropriate stimulus
Aggression is likely to occur if frustration is intentional.
Aggression is more likely to occur if frustration is aversive.
‹#›
22
Reflective-Impulsive Model
‹#›
23
Think about ‘priming’ or suggestion
Spreading Activation Model
‹#›
24
Implicit Aggression
Reflective-Impulsive model
Wheels
Car
Drive
Traffic
Anger
Bicycle
Round
Round-abouts
Reflective (questionnaires)
Higher self-control = lower verbal, physical, anger, hostility aggression scores in males and females
Impulsive (implicit)
Higher self-control = lower verbal, physical, anger aggression scores in males and females
‹#›
25
Social Learning Theories
These theories are integrated theories based on the feelings, thoughts and behaviour model of human behaviour.
Three aspects to understanding aggression:
the acquisition of aggressive behaviour;
the process of instigation of aggression; and
the conditions which maintain aggression
‹#›
26
Social Learning Theories
In social learning theory, aggressive behaviour is learnt vicariously and maintained by the reinforcements which are contingent upon its display.
Vicariously means by observing models
‹#›
27
Social Learning Theories: 5 monkeys
‹#›
28
Learning Aggression
aggression is observed – you see role models engaging in aggression;
aggression is reinforced – your role model is rewarded for their aggression and/or your own aggression is rewarded;
the individual has been subjected to aggression – you learn its power (and this may stop you from being aggressive).
Think about this in terms of childhood development in homes … aggressive parents… etc.
‹#›
29
Role and nature of models
Major models:
Family – aggressive families produce aggressive children
Peers
Symbolic models
‹#›
30
How does modelling work?
Aggressive behaviour is learned through modelling. Key factors are:
the importance of the model;
the effect of the model’s behaviour;
other behaviours which condone or condemn aggression.
‹#›
31
HINT: this is a good chance to ask me anything
‹#›
32
Maintaining aggression
Once aggressive behaviour is acquired how is it maintained?
By its consequences – as with all behaviours the more aggression is reinforced the more it is maintained
Stimulus discrimination means learning to exhibit behaviours in different situations – thus people learn to exhibit aggression under different stimuli. Aggressive people have less stimulus discrimination
‹#›
33
Maintaining aggression
Cognitive processes or how you think about aggression:
Role of values or cognitive scripts –endorsing aggression or
minimising harm
Attributions of hostile intent
Scripts endorsing particular styles of responding
‹#›
34
General Aggression Model
Anderson & Bushman (2018)
‹#›
35
General Aggression Model
Anderson & Bushman (2018)
‹#›
36
Determinants of Aggression
Other research has focussed on stimuli which precede aggression. This is not necessarily theoretical but it is consistent with learning theory based on ABC
Antecedent-Behaviour- Consequence
It recognises that many behaviours are controlled by events that occur before the behaviour
‹#›
37
Some Determinants
provocation
exposure to aggressive models
orders from an authority
drugs —those that reduce inhibitions (such as alcohol) and those that heighten arousal levels (such as amphetamines) but not a simple relationship
gender
aggressive cues eg weapons
displays of aggression
changing the environment
noise - induces stress which may induce aggression
heat but unclear
population density but only if felt
intrusion of personal space
physical pain
‹#›
38
Situational Precipitators
Prof. Richard Wortley (Head of UCL Crime Science)
‹#›
39
Situational Precipitators
Prof. Richard Wortley (Head of UCL Crime Science)
Prompts:
Aspects of the immediate environment that bring to the surface thoughts, feelings, desires that may be dormant
Pressures:
Situations exert pressure on individuals to perform inappropriate behaviours
Permissions:
situational factors can help distort moral reasoning processes
Provocations:
Situations can create stress and/or provoke antisocial responses, particularly aggression
‹#›
40
BSA and Aggression
‹#›
41
Grievance escalation
When does aggression occur?
When frustrated
And you consider aggression an acceptable response
Luckenbill and Doyle suggest a three stage model
‹#›
42
3 stage model
Naming: Grievances develop when one party (the victim) recognises that another party (victimiser) has caused harm. Furthermore, it is necessary that the victim holds the victimiser accountable for their “bad behaviour”.
Claiming: The transformation of the grievance into a demand for reparation. If acceptable to the victim then the dispute ends. If not it escalates to
Aggression.
Naming
Claiming
AGGRESSION
‹#›
43
Controlling aggression
In terms of controlling aggression, the traditional threat of punishment does not seem very useful in most situations and may backfire as it is often seen as a provocation - a further frustration. Punishment also suggests that the solution to conflict is the application of force, which is counterproductive since it is the wrong sort of behaviour to model.
‹#›
44
Media and violence
However you measure it, there is no doubt that we are saturated with violence in the media.
Does it matter?
Some evidence indicates long term effects of violence exposure with increases in aggressive behaviours, thoughts and feelings and decreases in niceness
‹#›
45
Media and violence
There is sound correlational evidence for a contagion effect for violence, including self harm
Makes sense form a social learning perspective because you
Observe aggression and
See aggression rewarded
But what if the models you identify with are not the media ones?
Do we engage in stimulus discrimination? Or
State dependent learning?
‹#›
46
Media and violence
‹#›
47
Media and violence
‹#›
48
In sum
Aggression is central to many crimes
But what is aggression?
How do we measure / quantify aggression?
If we cannot accurately define and quantify it, how can we hope to understand/treat it?
‹#›
49
Criminal Behaviour CRM203
Workshop 2: Nonverbal Behaviour
Please remember to engage on the LMS forums
1
Questions before we begin
Is body language a science?
Should body language be used in interrogations (i.e., Behavioural Analysis Interview of the Reid Technique)
If it is not a science, should we make it one?
Is statement analysis a science?
Should it be allowed in the judicial system?
If it’s not a science, should we make it one?
2
Let’s play a game…
Split into smaller groups (or elect someone to take over the screen, or the lecturer leads this)
The speaker makes 5 statements about themselves
1 of the statements must be a lie
WHICH IS THE LIE? (pay attention, then make notes on why you think that)
3
Background
Some background – essentially to show there is some ‘science’ to body language… but there’s a lot of art, too
4
Lecture Overview
The Science of Body Language
The Art of Body language
Lie detection
Statement Analysis
5
Science vs Art
Art
Science
6
The scientific method
Experimental
I’m going to suggest that ‘science’ has it backwards when it comes to body language. Too often, we try to ‘reduce’ the complex world to simple variables in a lab. On top of this, we test ‘participants’ (students, usually tired and disinterested). Is it any wonder that results do not replicate reality?
7
The scientific method
PNAS: Proceedings of the National Academy of Sciences
Example of a VERY high level publication, PNAS is very high impact factor, widely respected. Yet look at the stimuli they used. Can we really infer anything about the real world from this? And if we cannot, then what use are we in the real world?
8
The woes of research and application
Highly motivated liar – stakes high if caught
Highly motivated assessor
Poorly motivated assessor
Good lie detection
Poor lie detection
Poorly motivated liar – stakes low if caught
Highly motivated assessor
Poorly motivated assessor
Poor lie detection
Poor lie detection
If studies are not based on real people, who face real consequences from lying… how ‘good’ are they?
9
The Art…
What is NonVerbal Communication (NVC)
Eyes
Face
Body
Remember
Attempting to read everything about someone from one tell, is like trying to reach a destination with one signpost!
This makes scholars and academics scared. They see art and immediately want to defend themselves as scientists – in doing so, they may alienate themselves from the very thing they wish to study
10
Nonverbal Communication
Facial expressions
Tone of voice
Movement
Appearance
Eye contact
Gestures
Posture
11
Sales
[VALUE]
NVC Verbal 0.7 0.3
The eyes…
Gaze behaviour
Accessing directions
Lies
12
Accessing Behaviours
Myth vs Reality?
Left
is
Lying
Right
is
Recalled
Visual
Auditory
Feelings
Visual
Auditory
Feelings
Accessing behaviours are widely regarded as ‘hocus pocus’ and not real, and in the vast majority of cases this appears true.. Of course, “the vast majority of cases” involves students in labs… whether or to what degree a person exhibits accessing cues may be an individual difference (akin to some people cracking knuckles, or shuffling hands, or tapping their feet).
SPEND 10minutes going back through your videos of liars, and see if you can catch their eye moments. If you cannot, then find videos online (of real criminals!) and focus on their eyes.
IF YOU DON’T HAVE A VIDEO OF A LIAR YET, SHARE SOMEONE ELSES, and/or find one
13
Try it yourself
Watch through videos of real criminals lying
See if you can spot some of the ‘tells’
14
The face
Emotions
Micro-expressions / slips
15
The face
Facial expressions portray emotions
Universal?
New Guinea, 1968, locals read a story and asked to express emotions… American students asked to interpret expressions…
Happiness
Sadness
Anger
Disgust
16
The face
Joe is an ex-FBI agent, and a good friend. We’ve published papers together
17
Lie to me
Microexpressions
This receives a lot of bad publicity (I too have written papers against this). For the most part, microexpressions are useless in applied, daily terms- because we cannot see them.. But.. They’re just another indicator, another tool – and should not be entirely ignored, always
18
1
19
2
20
1
21
2
22
1
23
2
24
1
25
2
26
Microexpression ‘science’
Over 50 experts in body language came together to write an article on the state of the discipline.
27
The other case has been removed
(it will be posted in future lectures….)
“Someone (broke in and) murdered our daughter”
28
The Body
Congruence is key
If you want someone to agree –
nod your head
29
The Body
Comforters / manipulators
REMEMBER CONTEXT
30
The Body
Comforters / manipulators
31
The Body
Comforters / manipulators
32
33
Lie Detection
34
Lie Detection
Individual differences (Ekman et al., 1999)
NO SINGLE INDICATOR
Need baseline behaviour
35
Lie Detection
Problems in detecting lies:
Monitoring all aspects of what a possible liar is doing – verbal and nonverbal
Context: comforters/manipulators = lying or anxiety?
Emotion can be misread
Timing is important (could they plan? Are they trained? Are they natural?)
36
Lie Detection
Tells (false emotion):
Asymmetrical facial indicators (Chirality)
Negative emotions without sweating, change in breathing, or manipulators = lies (mostly)
Emotional expression should match verbal expression
Fear/sadness = forehead and eyebrows (missing = false)
Onset not too abrupt
Happiness needs Duchenne
lines
37
Time to test you…
President clinton
Was Clinton lying?
Statement Analysis
“I did not have sexual relations…”
“I never told anybody to lie, not a single time, never”
“These allegations are false”
None of these are lies
IT’S NOT ALL ABOUT BODY LANGUAGE!
The important thing to remember about body language research, is that if the individual is not lying (or if they honestly believe their lie), then their body language will NOT show any signs of deception!
43
Statement Analysis
January 21st, 1998; PBSs News Hour
Lehrer: “You had no sexual relationship with this young woman?”
Clinton: “There is not a sexual relationship – that is accurate”
44
It’s not all about the body…
The important thing to remember about body language research, is that if the individual is not lying (or if they honestly believe their lie), then their body language will NOT show any signs of deception!
45
Statement Analysis
The basics
46
Statement Analysis
Most people try to avoid lying (even/especially guilty people)
Why lie (and risk being caught), if you can re-word the truth and avoid it
Compare
“I am innocent, I did not kill her”
to
“I’m not guilty, I didn’t do it”
47
Case study: M. S.
48
Statement Analysis
Background
40 year old lady (MS), mental age of 12
Statement: elderly male neighbour sexually assaulted her
Witnesses said they saw MS entering JBs house; but, they had difficulty believing “cat-loving” JB would do such a thing…
Police involved
Soon after, witnesses who reported seeing MS enter JB house started receiving threatening letters… all letters claimed to be from ‘friend’ of the suspect, that he (the suspect) did not rape MS
At the same time, JB wrote several letters making similar claims
49
Statement Analysis
Known 1
“… i was arrested and charged with the rape of MS. I could not believe this as I am and was impotent”
Known 2
“… when i was arrested, i was firstly charged with raping MS, stated to the police that i could not rape anyone, as I was impotent, and had been since 1996”
50
Statement Analysis
Unknown 1
“The good fortune is JB was able through solicitors, police forensics, and medical experts to prove 100\% that he could not and did not rape or have unlawful sex, through his being Impotent and is and has been for five years or more”
Unknown 2
“Neither would have known that JB, was to enter hospital to have tests to prove that he is and was impotent”
51
Statement Analysis
TEXT Projecting clause Projected clause
K1 I could not believe this as I am and was impotent
K2 I could not rape anyone As I was impotent and had been since 1996
U1 JB was able… to prove… that he could not and did not rape through his being impotent and is and has been for five years
U2 Neither would know that JB that he is and was impotent
52
Statement Analysis
The historical present tense in corpus results and internet searches
String Freq
was and is 60
is and was 2
am and was 1
was and am 0
String Freq
I was and am 155,000
I am and was 20,600
He was and is 174,000
He is and was 21,300
She was and is 55,100
She is and was 727
We were and are 50,300
We are and were 904
They were and are 122,000
They are and were 31,800
53
Verdict?
Use this for discussion.
If you want to keep the debate going, you could ask what other factors the students would want to know, to better inform the judgement
54
Case: Chris Jerue
55
Statement Analysis
Was Chris Jerue lying?
September 14th / 15th 1991
Frank Corly found murdered in apartment in Anchorage, Alaska
Within hours of finding body, Chris Jerue was a suspect
T.H. (female minor), acquaintance of Chris Jerue, explained to police CJs involvement
CJ and his friend Lavon S. (male minor) seen riding stolen bicycles from Corly’s home after his murder.
Police stopped them at store, found .22 revolver in possession of Lavon, T.H. ran into them at grocery store, cycled spare bike home, and en route CJ admitted to crime.
T.H. testimony: CJ has admitted “we shot somebody”
Police made T.H. phone CJ and attempt a further confession
No admissions by CJ, but did ask T.H. “not to say anything to anyone about it”
56
Statement Analysis
Not satisfied with T.H.s call, another friend (Jennifer Wilson) asked to visit CJ, wearing a hidden microphone
Jennifer persistently asks “Why did you have to kill him?”
CJ states the victim was “a faggot who tried to hit on them” and Lavon S. had a gun and shot him.
CJ admits to robbing Corly afterward
Jennifer: “I cannot believe you guys killed somebody”
CJ: “Hey, he did it, I didn’t do shit”
Police arrested CJ and Lavon
57
Statement Analysis
Police efforts to get CJ to admit to planning the murder were couched in the verb ‘to know’
“You already knew what you were gonna do when you went back over to the apartment?”
“you knew that before you even went back over there, right?”
“you knew what you were gonna do before you even got there. Both you and Lavon”
58
Statement Analysis
The verb know has several meanings
To have understanding of or be acquainted with
To have experienced
To be acquainted with
To be aware of the truth of factuality of
To be convinced or certain
59
Statement Analysis
But, you can also say “I know that Matt Damon wasn’t right for me”, or, “I know that Rich Froning loves me”
Such statements connote more than the dictionary meanings; they indicate predictions, suspicions, or speculations
CJs response:
“no”
“yeah, but I didn’t know he was gonna shoot him though”
“we didn’t plan to kill him when we were goin’ over there”
Clear denial
60
Statement Analysis
Interrogator’s Qs
CJs Response
1. You guys
intended to go over there and kill him, didn’t you?
No, we didn’t plan to kill him
at all
2. But it was an understanding and a plan between the two of you for
him to do it, right?
Yeah
3. You both planned it
–
before
–
up
to 2 hours before you and Lavon
actually shot him, you both planned on
shootin
’ him, right?
Right
4. Ok,
that’s what we thought, and you just had to kill him to rip his stuff
off
No, we were
gonna
hold him at
gunpoint, that’s
what I thought
5. But about 2 hours before he actually shot him is when he changed
your
mind and decided to shoot him, right?
Right
6. Then, if I understand
you right, you guys changed your mind from
robbin
’ him to
shootin
’ him about hours before he actually shot him,
right?
Yeah, about that, yeah
7. That’s when both of you changed
your mind, you both agreed on it at
that point, right?
Right
61
Statement Analysis
At this point, things look bleak for CJ
Denied ‘intended’ but agreed on a plan…
… but what is ‘it’
CJ jumps back and forth between admitting and denying – why?
Q5 – difficult to know what CJ was replying to: “he changed your mind and decided to shoot him” – interpreted as “he changed his mind and decided to shoot him”
Evidence for this reading bolstered by officer’s omission of any possessive pronoun at all before ‘decided’.
Also unclear who (he or you) “decided to shoot him”
62
Statement Analysis
Interrogator’s Qs CJs Response
1. You both intended to kill him No
2. You both planned to do it Yeah
3. You both planned it 2 hours before Lavon shot him Yeah
4. You had to kill him to rob him No
5. Two hours before he changed your mind and decided to shoot him Right
6. You guys changed your mind 2 hours before he shot him Yeah, about that
7. You changed your mind, both agreed on it, at that point Right
63
Statement Analysis
Q1 and Q4 focus on ‘kill’ and CJ strongly denies
Q2, 3, 7 focus on it and time reference, CJ is affirmative
Seems CJ is giving contradictory statements – but careful examination shows otherwise
Interrogator:
1 (kill) no;
replace with ‘do it’ yes;
do it (time focus) yes;
kill no;
do it (time focus) yes;
do it (time focus) yes
64
Statement Analysis
Q5 is the ‘problem’ sentence “he changed your mind and decided to shoot him”
Emphasis on ‘he’, and whatever significance CJ put on ‘changed your mind’ the emphasis of ‘he’ and ‘decided to shoot him’ is indisputable
The sentence becomes a complicated “he… decided to shoot him”
CJs ‘yes set’ is about the time (2 hours) and that he (Lavon) decided to shoot him
65
Statement Analysis
Q6 attempts to clarify this ambiguity “you guys changed your mind”
Unfortunately, the “about 2 hours before he actually shot him” –means CJ responded to that part: “yeah, about that, yeah” – more likely to follow a time questions
All evidence and advice suggests police ask simple questions, NOT compound, complex questions
Q7 rephrases Q6, but according to recency principle (responding to most recent proposition in a sequence), CJ is responding the 2 hours part
66
Statement Analysis
CJs responses
Yes to time focus
Yes to plan to rob (“it”)
No to intend to kill
1
2
3
4
5
6
7
???
Sequence of statements
6. You guys changed your mind 2 hours before he shot him Yeah, about that
67
Verdict?
Use this for discussion.
If you want to keep the debate going, you could ask what other factors the students would want to know, to better inform the judgement
68
Statement Analysis
CJ obviously guilt of many things (including robbery, and planning to rob)
Clearly not guilty of murder
Unclear if he planned to kill
CJ was penniless.
Prosecution used the interview evidence
He was convicted of aiding in the planned murder of Frank Corly
69
Statement Analysis
This was a real-world case I am currently working on. This statement was made by the Father (whose young daughter was found murdered 2 days later)…
You could ask students to dissect/analyse this
70
BSA and Interrogations
71
Marono et al…
72
Marono, Clarke, Navarro, & Keatley
Lying is more than just ‘a tell’
Joe Navarro suggested we need to look at ‘clusters’ of behaviours
We took that a step further (with Joe) and looked at the sequences of behaviours, within those clusters, IN REAL CRIMINALS
73
Marono et al…
You can follow these around to see the behaviours exhibited as people lie… thicker lines means the ‘transition’ (link) between two behaviours is occurring more than we would expect to see by change.
THERE IS STILL LOTS TO DO HERE!
74
Keatley, Marono, & Clarke (2018)
We wanted to look at police interrogations… so we went for ‘the big one’ – Brendan Dassey
75
T-Pattern Analysis (Keatley, 2018)
This is just to tell students there are other more complex ways of doing these analyses – I will likely create a short 10minute help video for this
76
Now,
Evaluate body language and statement analysis research – good? Bad? Split the group in 2 if possible (REMEMBER TO RE-START RECORDING WHEN THEY COME BACK TOGETHER)
Consider:
Are they useful? Why/why not?
Should they be allowed in judicial proceedings (from interview to courts?) why? Why not?
Should we be spending time improving the methods (if we cannot ‘get rid’ of them, should we at least be aiming to improve them?)
77
Closing comments
Behaviour is extremely hard to predict
Behaviour is extremely hard to ‘read’
NEVER just focus on one ‘tell’
NEVER just focus on body language or verbal statements
Researchers are moving towards more scientific methods…
But it is not a science… (should it be?)
It’s a skill, and takes many, many, many…… many hours…
78
Criminal Behaviour CRM203
Workshop 4: Psychopathy
&
Mental Disorder
‹#›
1
Matters arising
MCQ upcoming (more details in future weeks)
Remember to have good internet connection
There is enough time, but it is time limited
Read around the topics (don’t just rely on workshop notes!)
‹#›
2
Workshop Overview
Part 1:
What is Psychopathy?
How to measure psychopathy?
Practical implications
Part 2:
Define the concept of mental disorder or mental illness.
Provide an overview of the DSM-V and the diagnoses that are most relevant to criminal behaviour.
Define and review issues relating to competency to stand trial.
Discuss the prevalence of mental illness in incarcerated populations.
Define risk assessment and identify various tests
Network Analysis of Drugs/trafficking
Rather than me reciting B&B / drug names
‹#›
B& B = bartol and bartol - the core textbook. This works as a reminder of what the core textbook is (link back to MCQ!) and it also points out that this course is NOT just a repetition of the textbook. We get to underline why coming to workshops is important, and why it’s more than reading a book etc
3
PSYCHOPATHY
‹#›
4
A confusion of terms…
Primary Psychopaths
Secondary Psychopaths
Dyssocial Psychopaths
Sociopath
Anti-social Personality Disorder (APD)
Dyssocial Personality – ICD10
Life Course Persistent - LCP
‹#›
5
Sociopathy Vs Psychopathy
The psychopath is callous, yet charming. He or she will con and manipulate others with charisma and intimidation and can effectively mimic feelings to present as normal to society. The psychopath is organized in their criminal thinking and behavior, and can maintain good emotional and physical control, displaying little to no emotional or autonomic arousal, even under situations that most would find threatening or horrifying. The psychopath is keenly aware that what he or she is doing is wrong, but does not care.
Conversely, the sociopath is less organized in his or her demeanor; he or she might be nervous, easily agitated, and quick to display anger. A sociopath is more likely to spontaneously act out in inappropriate ways without thinking through the consequences. Compared to the psychopath, the sociopath will not be able to move through society committing callous crimes as easily, as they can form attachments and often have normal temperaments. . . .“
Kelly McAleer, Psy.D
‹#›
6
Sociopathy Vs Psychopathy
‹#›
7
Psychopaths in the workplace
5 Phase model
Entry – charm and social skills to obtain employment; hard to spot; helpful, even benevolent
Assessment – weigh up your usefulness: pawn (easily influenced) or patron (protect against attacks)
Manipulation – create ‘psychopathic fiction’ – positive info about self, misinformation about others, pawns or patrons used
Confrontation – character assassination to maintain agenda
Ascension – patron discarded and power claimed by psychopath
‹#›
8
Female Psychopaths…
May be more violent to close intimates
Use manipulation, flirtation, or coercion
instead of physical aggression to achieve
control
More likely to have been a victim of sexual abuse
BUT
Equally likely to use drugs and alcohol
‹#›
9
Are you a psychopath?
‹#›
This is the Trolley problem. If you want, you can find videos of this – there are some nice ones, or just guide them through it. Even if they already know it, you can discuss and debate the morals of it etc.
10
The proposition
There are some individuals “who demonstrate a discernible cluster of psychological, interpersonal and neurological features that distinguish him or her from the general population” (Bartol &Bartol)
‹#›
11
DSM V
The requirement of six out of seven trait facets with a resulting broader representation of psychopathic personality traits (e.g., callousness, manipulativeness) provides for a more severe presentation of Antisocial PD that is more reflective of what has always been the target construct for this disorder (e.g., Hare, 1996)
However, constraining the DSM-5 conceptualizations to pre-defined conceptual theories of psychopathy likely does not take full advantage of this emerging model in providing psychopathy-relevant trait information.
‹#›
12
DSM V
Psychopathy scholars continue to debate a variety of important issues, including (but not limited to) optimal factor structures (e.g., Cooke et al., 2006; Hare & Neumann, 2008), whether antisocial/criminal behavior should be part of the construct (e.g., Skeem & Cooke, 2010; Hare & Neumann, 2010), and the role of fearless-dominance/boldness in psychopathy (e.g., Lilienfeld et al., 2012; Miller & Lynam, 2012).
Moreover, scholars also continue to ponder which elements need to be present to constitute psychopathy (or “primary” psychopathy), including whether affective-interpersonal traits (e.g., callousness, deceitfulness, social potency) are sufficient in isolation (Lilienfeld, 1994; Poythress & Hall, 2011) in light of that not all individuals high on psychopathy are impulsive (cf. Hicks et al., 2004; Poythress & Hall, 2011).
‹#›
13
Clinical Description
Various historical descriptors based around concepts such as moral insanity, sexual depravity or problems with affect
Today we base it on developments from Cleckley’s The Mask of Sanity
Which Hare (1970) has formalised into the
Psychopathy Check List. This has been revised
and is now referred to as the PCL-R.
‹#›
14
Before we begin…
Do you all know what factor analysis is?
‹#›
This is important for students to know, because it will underpin our understanding of psychopathy. We need to know that it is a statistical approach, and as such there are issues within it.
15
PCL-R Factor 1
Glibness, superficial charm, sociable, outgoing, easy to get on with
Grandiose sense of self worth
Need for stimulation/excitement, prone to boredom
Pathological lying
Cunning, manipulative interpersonal skills, often based on charm
Lack of remorse or guilt
Shallow affect
Lack of empathy; callous; unable to love: selfish; egocentric; non-altruistic; non-empathic except as a means of manipulation. The psychopaths inability to feel genuine, meaningful affection for another is absolute“
‹#›
16
PCL-R Factor 2
Parasitic life style
Poor behavioural controls
Promiscuous sexual relations
Early behaviour problems
Lack of realistic, long term goals
Impulsivity
Irresponsibility
Failure to accept responsibility, no insight
Many short term-marital relationships
Juvenile delinquency
Revocation of conditional release
Criminal versatility
‹#›
17
PCL-R
PCL-R is scored on a 0 (not present) 1(inconsistently present), 2 (consistently present)
Cut off scores vary between 21 to 33
It does have utility as a predictor but it is not the best predictor
‹#›
18
Factor Analysis
Two Factor
Factor 1 – the empathy factor (emotional make up and responses)
Factor 2 – the impulsivity factor (the antisocial traits). This is the better predictor of recidivism.
Three Factor
Adds the grandiose factor
‹#›
19
Factor Analysis II
Four Factors
Interpersonal – lying, manipulative
Impulsive
Affective – empathy and grandiosity
Antisocial – poor regulation, criminality
‹#›
20
Factor Analysis II
‹#›
21
Additional Attributes
These are sometimes included in descriptions
Appears intelligent; often well informed; willing to give views on almost anything (Cleckley suggested above average)
Absence of psychotic symptoms
Absence of anxiety
Egocentric
Cool, calm & collected. Able to withstand severe stress
‹#›
22
The issues of treatment
Cleckley in particular started the thesis that psychopathy was not treatable
The belief that psychopaths do not benefit from treatment is firmly entrenched with some and entirely rejected by others
‹#›
23
The issues of treatment
Firstly this assumes the existence of psychopathy
Secondly it blames the person for the lack of effective treatment – the treatment worked, it’s a pity the patient died!
Thirdly, here is what we know: the PCL-R identifies high risk individuals; these individual are the most entrenched individuals (start earlier etc); entrenched behaviour is the most difficult to shift; entrenched behaviour requires considerable doses of treatment; treatment programs have historically targeted the wrong needs; treatment programs are not sufficiently funded;
‹#›
24
The issues of treatment
There are many treatment programmes that have demonstrated effectiveness for high risk offenders but they do not measure psychopathy and do not treat psychopathy
These programs focus on criminogenic needs
‹#›
25
‹#›
OPTIONAL IF YOU WANT TO USE THIS
26
Biological explanation
A variety of biological indicators have been found in psychopaths
There are now a variety of biological explanations
‹#›
27
Hemispheric Dysfunction
Hemispheric dysfunction theory suggests left hemisphere is dysfunctional in that it does not provide sufficient control over impulsivity ie poor self regulation.
Some suggestion of right hemisphere
dysfunction – emotions not felt as strongly.
Note these are consistent with the two
major dimensions: poor impulse control
and indifference to others.
‹#›
28
Executive Function Problems
There is evidence that high risk offenders have executive control problems
Executive control lies in the pre-frontal cortex and is responsible for organising, planning and inhibition – for consequential thinking
This evidence points to pre-frontal lobe damage or dysfunction as a potential explanation for psychopathy
‹#›
29
Amygdala Dysfunction
As already noted, the amygdala is critical in emotional processing
There is evidence that damage or dysfunction is seen in psychopaths
This would explain the lack of emotional responding and would be consistent with the lack of empathy dimension
‹#›
30
ANS Under Arousal
Electrical conductance of skin of psychopaths is lower than normals
Suggests under-activity of sympathetic or over-activity of parasympathetic nervous system
Implication: ANS does not respond
to external threat and/or ANS filters
information to CNS
Thus they tend to have lower
levels of anxiety
Autonomic Nervous System
(regulates the internal organs without conscious recognition or effort)
‹#›
31
ANS Under Arousal
Anxiety might be important for avoiding bad behaviour because
Bad behaviour leads to punishment which results in anxiety and with pairing bad behaviour leads to anxiety which we avoid. It could explain the non-learning.
We avoid bad behaviour because it makes us look bad. Looking bad causes us anxiety. Thus we like to do good to avoid the anxiety/feeling guilty. That is altruistic behaviour avoids anxiety. It could explain the callous trait.
‹#›
32
ANS Under Arousal
ANS under arousal also explains the impulsivity/sensation seeking activities of psychopaths. That is, they are under-aroused and seek out arousal.
Here’s an observation: many high risk violent offenders describe themselves as “pretty laid back, really”. Why?
‹#›
33
Environmental Factors
There is little doubt that environmental factors impact on criminality
Poor parenting evidence is very robust
There are two explanations for the biological evidence
Poor parenting causes the evidence (but this does not explain the genetic evidence)
It is a double edged sword: people who have these conditions are poor parents and they pass them onto their children
‹#›
34
Classification Issues
Psychopathy is a very powerful negative label, particularly in the UK and North America. It is less significant in Australia.
It describes a cluster of attributes which are considered (by some) to be a class. The very first question is whether or not the label has meaning.
‹#›
35
Issues with Classification
Problem of labelling. Labels focus our attention on the attributes in common not in distinction. Sometimes, as in psychological classifications, there are greater differences than there are similarities.
But are labels necessary for communication, prediction and decision making; especially true for CJS.
Does this label add to our understanding?
There are few prototypical cases. Most only have some of the attributes of the class. They are more defined by the heterogeneity than their homogeneity.
There is considerable variation in psychopathic traits from outright villains to heroes
‹#›
36
Issues with Classification
Furthermore, some characteristics of psychopathy are also characteristics of other personality disorders. This makes differential classification/diagnosis very problematic.
Dichotomous versus continuous distinction.
Difference in kind or difference in degree?
Classification systems require reliable criteria, consistency of usage and theoretical relevance to explanation and prediction
Hare has attempted to produce a reliable criterion – based on his test!
PCL-R is a reliable and valid predictor in some circumstances of recidivism but not the best.
‹#›
37
Issues with Classification
The argument goes: high risk offenders are psychopaths. The PCL-R identifies high risk offenders; therefore the PCL-R identifies psychopaths; therefore psychopaths exist!!
Risk – again, one of the identification variables is high risk of re-offending. High recidivism is an indication of psychopathy. This is circular since high risk offending is merely high risk offending.
‹#›
38
Issues with Classification
Label confusion – term has been changed from sociopath to psychopath to ASPD or APD and there have been changing criteria.
Varying degrees of moral overtones - now has strongly pejorative connotations “intra-species predator”
Aetiological confusion – causation is unclear (almost totally)
Are we dealing with just one condition?
‹#›
39
Psychopathy- in sum
Is it a moral judgement or a clinical diagnosis? (does it vary depending on context?)
Is it a useful ‘diagnosis’
Is it more harmful than helpful?
If we cannot agree on a definition, how can we agree on causes, or outcomes?
‹#›
40
Mental Disorders (and drugs)
‹#›
41
Lecture Overview
Define the concept of mental disorder or mental illness.
Provide an overview of the DSM-V and the diagnoses that are most relevant to criminal behaviour.
Define and review issues relating to competency to stand trial.
Discuss the prevalence of mental illness in incarcerated populations.
Define risk assessment and identify various tests
Network Analysis of Drugs/trafficking
Rather than me reciting B&B / drug names
‹#›
NOTE: make it clear that I am not suggesting the use of drugs (for clinical reasons) is related to criminal reasons. I am just trying to give students something ‘new’ to think about. A new method, and a relation to criminology.
42
Identification issue
Deviation from a statistical norm (statistical abnormality) – IQ, MMPI
Deviation from a cultural norm (cultural or value concept of abnormality).
Maladjustment - the person does not meet the demands placed upon him/her. (A distress concept - could be normal both culturally and statistically).
Disordered - a system thrown into confusion, disarray
‹#›
43
Bartol & Bartol definition
A disorder of the mind that is judged by experts to interfere substantially with a person’s ability to cope with life on a daily basis (page 238)
The judgment is by experts – this is a clinical versus forensic distinction
‹#›
44
Problems of identification
A disorder not an illness
Cannot be objectively seen – there are no micro-organisms, lesions or broken bones, furthermore it is likely that there are many “causes” for the same disorder ie diagnosis does not produce aetiology, treatment or prognosis
‹#›
45
Problems of identification
Is inferred – it is a subjective evaluation (even if it is dressed in objectivity) of another’s behaviour generally with the aim to control
(note historically it wasn’t even behaviourally based)
Radical criminology & anti-psychiatry have argued that both criminal law and psychiatry are part of the same mechanism of control of deviance.
‹#›
46
Diagnosis
Diagnostic and Statistical Manual – DSM-V of American Psychiatric Association
World Health Organisation International Classification of Diseases ICD–10 Chapter V
DSM used in America, ICD-10 used in Europe
Both used in Australia
‹#›
47
Crime and Mental Disorder
Strong views in society that mental disorder is related to crime probably based on media portrayal and fear
Mentally ill persons act outside normal rules & this might “logically” run to legal rules
We believe that some acts are so abhorrent that they could only be done by a person who was insane (although the evil line is gaining momentum).
‹#›
48
Crime and Mental Disorder
Are there any categories of mental disorder that are relevant to crime?
Relevance means:
Increasing risk or causally linked
Criminal responsibility
‹#›
49
Diagnoses relevant to crime
Schizophrenia
Paranoid disorders
Mood disorders
Personality disorders – especially APD or Dissocial Personality Disorder (ICD-10)
Intellectual disability
Substance abuse
‹#›
50
Schizoprenia
Severely disturbed – thoughts, feelings or perceptions
Positive categories – excess or distortions (delusions or hallucinations)
Negative categories – losses of normal function (emotional & cognitive flattening resulting disorganised speech and behaviour and inappropriate affect)
‹#›
51
Delusions
Persecution beliefs common: being tormented, followed, tricked, spied on, or being made fun of.
Some people believe that certain gestures, comments, passages from books, newspapers or movies (and so on) are directed specifically at them.
‹#›
52
Hallucinations
Perceptual disturbances
Auditory most common
Command hallucinations critical
‹#›
53
Paranoid Schizophrenia
Delusions or hallucinations only and no signs of disorganisation or flattening of emotions
Specific themes often of persecution
Higher risk of committing a violent offence and/or of hurting themselves
Risk is significantly increased in a background of anti-social behaviour especially violence
‹#›
NOTE: these have been changed in the latest DSM-V.
I recently worked a case with a “paranoid schizophrenic” – might be worth asking students to find/research some cases, and talk about the offender, their behaviour and process etc. Set it as ‘after workshop work’ if you want
54
Paranoid Disorders
Delusional disorders with paranoid theme
Differential diagnosis problematic but needs to be present for 1 month as opposed to 6 months and is more generally suspicious as opposed to clearly delusional
Increased risk especially in presence of anti-social history
‹#›
55
Mood Disorders
The DSM-V identifies a variety of mood disorders
Bipolar which is a combination of mania and/or depression
Depressive disorders
‹#›
56
Mood Disorders: Depression
Depression: includes hopelessness, increased irritability (especially children)
Loss of interest or pleasure – don’t care any more
Risk is elevated in juveniles and those who think others are better off dead
‹#›
57
Mood Disorders: Mania
Abnormally and persistently elevated, expansive, or irritable mood (which may alternate)
Poor judgment often leads to activities that are likely to have painful consequences
‹#›
58
Mood Disorders: Mixed
Some people have both a Manic Episode and a Major Depressive Episode occurring daily. This is frequently referred to a manic depressive psychosis or bipolar mood disorder.
The swings can occur at very short notice
This condition seems to be related to serious violence which may also involve self harm– ie homicide, especially of loved ones
‹#›
59
Personality Disorders
Anti-social personality
Borderline personality disorder – extreme emotionality & impulsivity
Narcissistic personality disorder – extreme sense of entitlement
ICD-10 different terms
‹#›
60
Anxiety Disorders
Appears very similar to heart attack
Fear of dying, lose control, have a heart attack or go crazy & the need to flee
Not common, probably under-represented in offenders, but
Anxiety does occur when in prison
‹#›
61
Intellectual Disability
Normal prevalence rate is around 2\%
Rates in prisons as high as 10\%
Over-represented in violent offences & a risk factor if sexually offending
‹#›
62
Substance Abuse
Will deal with this material later, but it is evident that substance abuse and crime have a link.
Note and this is a very important note, no causality is being inferred!!!!
‹#›
63
Mental disorder and criminal law
Fitness to plea
Not guilty on grounds of insanity
Intersection between criminal justice system and mental health system
‹#›
64
Mental unfitness to stand trial
Criminal Law (Mentally Impaired Accused) Act
‹#›
65
S9 unable to understand
nature of the charge;
requirement to plead to the charge or the effect of a plea;
purpose of a trial;
the right to challenge jurors;
‹#›
66
S9 unable to understand
follow the course of the trial;
understand the substantial effect of evidence presented by the prosecution in the trial; or
unable to properly defend the charge
‹#›
67
Insanity
Criminal code S 27 Insanity
(1)… not criminally responsible … if at the time of doing the act … (had) a state of mental impairment as to deprive him of capacity to understand what he is doing, or … to control … to know that he ought not to do the act … .
(2) … being delusional is not automatic insanity
Essentially based on McNaughton rule
‹#›
68
Bartol & Bartol
Two Criteria
Irrationality: Person was not in control of his or her mental processes at the time of the offense
Compulsion: Person was not in control of his or her behavior at the time of the offense
And not knowing right from wrong
‹#›
69
Insanity defence
Insanity defence generally used very conservatively, diminished responsibility preferred tactic (indeterminacy versus mitigation)
Insanity can lead to indefinite detention in prison or hospital
‹#›
70
Mentally Impaired Accused
People who have found unfit or insane
Detained in
Detention centre – juvenile
Prison
Approved hospital
Declared place
‹#›
71
Other
Prisoners with serious mental illness (schizophrenia) in acute phase – may be serviced by State Forensic Mental Health Services (SFMHS)
Parolees with serious mental illness may be serviced by SFMHS
Mental Health Act part 3 – Involuntary Patients
‹#›
72
Mental illness & offenders link
What are the strategies?
Longitudinal studies – follow a cohort
Examine mental illness in offenders/prisoners
Examine criminality in mental patients
Longitudinal studies are expensive and rare
Definitions of disorder always a problem (APD, substance abuse etc)
‹#›
73
Risk Assessment
Statistical versus clinical judgement
Aim is to identify level of risk
Some instruments identify risk factors (HCR 20)
Some instruments identify level of risk only (LSI-R)
Some instruments identify risk for specific offences (VRAG, SORAG, STATIC 99)
‹#›
74
Summary
Mental disorder alone is not a predictor
Heterogeneity in mental disorder category
Mental disorder (schizophrenia, intellectual disability) increases risk for risky people
Mental disorder basis for some offenders
‹#›
75
Key Issues
Care/treatment for seriously disordered or protection from serious offenders
What do we do with seriously disordered serious offenders?
Should a person be sentenced on proportionality or on responsibility?
Can diminished responsibility be used to give a person a lower sentence and a higher sentence?
Has de-institutionalisation impacted on CJS?
‹#›
76
What does this mean?
The law is dichotomous but disorder is continuous – it results in a discontinuous system especially once sentenced. Disorder can be treated or transient for other reasons but a criminal act is not.
‹#›
77
Drugs and networks
‹#›
78
Case Study: Jeffrey MacDonald
Aka: Green Beret Killer
Accused (and prosecuted) of killing his entire family
Wife, 2 children
Why?
Speculation his diet pills were a factor: Eskatrol Spansule (15mg Dextroamphetamine) (“Speed”) and 7.5mg Prochlorperazine (Compazine) to counteract the excitability of the speed
Taking 3-5 pills daily for 3-4 weeks prior
Would that be enough to lead to ‘chronic amphetamine psychosis’
Would that explain the murders?
Symptoms of cessation? ‘extreme fatigue and mental depression’
Why are we so quick to conclude “stimulants cause homicide” – we wouldn’t say “heroin causes burglaries”
‹#›
This is a very interesting case, if students want to learn more, they can read my recent publication:
Matrix Forecasting and Behaviour Sequence Analysis: Part of the Timeline Toolkit for Criminal Investigation
https://link.springer.com/article/10.1007/s11896-020-09367-1
I’ll upload the pdf
79
Drug trafficking and networks: CSA
A. Search customer: walk to spot lone with white male, 30-49 years of age
B. Solicit customer: say type of drug(s) for sale when face-to-face
1. Agree on terms: agree to provide 1 gram of cocaine for $50
2. Make exchange: fulfill agreement
C. Arrange place/time: tell customer to walk together to nearby place ASAP
Start
Steps A, B, C are facilitating steps
Steps 1, 2 are necessary steps
‹#›
If students want to know more about CSA, they can read my school shooter paper, or my recent ‘Timeline Toolkit’ paper (I’ll upload both)
80
Drug trafficking and networks: CSA
‹#›
81
Drug trafficking and networks: CSA
‹#›
82
Drug trafficking and networks: SNA
What is (social) Network Analysis
Network Analysis: interpreting the relationship between ‘nodes’ (individuals, factors, ‘points of interest’)
Relationships: connections between nodes
Connections: (influence, interaction, supply)
Node
(entity, person,
system group)
Tie / Link
(relationship/
connection between
2 nodes)
‹#›
83
What is (social) Network Analysis
Drug trafficking and networks: SNA
‹#›
84
What is (social) Network Analysis
Drug trafficking and networks: SNA
‹#›
85
Drug trafficking and networks: SNA
‹#›
86
What is (social) Network Analysis
Drug trafficking and networks: SNA
‹#›
87
What is (social) Network Analysis
Drug trafficking and networks: SNA
‹#›
88
In sum
How can these methods help us ‘work’ a cold case?
Understanding a script?
Networks of connections?
Can they be combined?
Why do we think that drugs cause crime?
‹#›
89
Criminal Behaviour CRM203
Atypical Homicide
‹#›
1
Content
Legal aspects
Case studies
CyberHomicide
Victimology
Serial Killers
Detection Avoidance/Complex Homicides
Terrorism
‹#›
2
Definition
‹#›
3
Legal Points
Murder
Intend to cause the death of a person (regardless of whether or not they intended to kill the person who was actually killed); or
Intend to cause an injury likely to endanger the life of a person; or
Cause a death by an act that is done in prosecution of an unlawful purpose and that is likely to endanger human life (regardless of whether or not they intended to hurt anyone).
‹#›
4
Legal Points
Manslaughter
a person who unlawfully kills a person in circumstances that do not constitute murder, is guilty of manslaughter.
THE KEY DIFFERENCE IS ‘INTENT’
‹#›
5
Actus Reus vs Mens Rea
A wrongful deed, guilty act or deed of crime. All crimes have two elements:
performing the act (actus reus); and
the intent to commit the act (mens rea)
The Actus reus is the causing of the death of a human being
Mens rea comes from the Latin phrase;
Actus non facit reum nisi mens sit rea
An act does not make a man guilty unless his mind be also guilty
‹#›
6
Interpretation
If the intention to kill or to act in a way that can predictably lead to the death is not proved, one can not be found guilty of the crime of murder because the definition of this crime includes this condition (to be convicted, you need both the mens rea and the actus reus, also known as the psychological and material elements); without the mens rea for murder, the accusation will usually turn into manslaughter, a different but similar crime that does not require the same mens rea.
‹#›
7
REMEMBER:
“The difference between a homicide and an assault may simply be the intervention of a bystander, the accuracy of a gun, the weight of a frying pan, the speed of an ambulance or the availability of a trauma centre”
(Gottfredson & Hirschi, 1990, p.34)
‹#›
8
Case study: Michelle Carter
“I love you, now die”
Michelle Carter and Conrad Roy
Wreckless behaviour caused death by suicide.
Ruling: ‘Involuntary Manslaughter’
What do you think?
‹#›
9
Digital Homicide
Increasing focus on digital crime
Dark/deep web is a primary focus (BUT BE WARNED)
Research suggests 4 themes:
Excessive violence
Fatal escalation
Crime-related incidents
Predatory behaviour
‹#›
10
Victimology
Men are more likely to be the perpetrators and victims of homicides (80-90 \% of perpetrators and 60\% of victims)
Half of all homicides involve a male offender and a male victim
Young people over 16 are at greater risk of becoming a victim than children or older adults: peak age among adults is between 21-25 years
Children are a low risk group, but infants under 1 year are at higher risk than any other single year age group
‹#›
11
Victimology
Offenders tend to be young with most aged between 18-35 years
In male on male homicides, a significant proportion of offenders, victims or both have consumed alcohol, often to excess
Men are more likely to be killed by strangers or acquaintances
Women are more likely to be killed by spouses, partners, or ex-partners
Homicides among unrelated men take the form of confrontational ‘honour contests’ that erupt spontaneously
‹#›
12
Victimology
Other male on male killings entail grudge/revenge style homicides where the offender seeks out the victim and commits a planned assault
Around 60\% of homicides occur between 8pm and 4am
NOTE: Aoristic Timeline Analysis
‹#›
13
Prevention?
Is homicide an extreme act of violence that could be prevented?
OR
Is homicide a distinct phenomenon where the perpetrator fully intends to kill the victim?
‹#›
14
Sexual Homicides
Ressler, Burgess, & Douglas interviewed 36 men convicted of sexual homicide to ascertain the underlying causes of the offences, the motivations and the actions within the crimes
‹#›
15
Sexual Homicides
Growing up
Childhood attributes – eldest sons, normal to superior IQ, fathers employed, mother housewife
Social environment
Family functioning – parental histories (alcohol/drug abuse, psychiatric disorder); parental criminal history (sexual crimes); parental sexual problems
Relationship with parents/siblings – instability of residence, father absent (12 years +), mother dominant parent, negative relationship with male caretaker figures and mother, perceived unfairly treated, no older sibling role model
‹#›
16
Sexual Homicides
Formative events
History of excessive parental discipline
History of abuse and neglect
Sexual experiences – witnessing sexual violence, witnessing disturbing sex, sexual injury or disease, sexually stressful events, childhood sexual abuse, voyeurism, pornography, fetishism, rape fantasies, sexual incompetence, sexual aversion, autoerotic practices
‹#›
17
Sexual Homicides
Formative events
Typologies
Behaviours
Childhood
abuse
‹#›
18
Sexual Homicides
Behavioural Indicators
Childhood – daydreaming, compulsive masturbation, isolation, chronic lying, enuresis, rebelliousness, nightmares, destroying property, fire setting, stealing, cruelty to children/animals, poor body image
Adolescence – assaultive action toward adults, rebelliousness, compulsive masturbation, stealing, daydreaming, isolation, chronic lying, nightmares, poor body image, cruelty to children, destroying property, enuresis, fire setting and cruelty to animals
Adulthood – assaultive action toward adults, daydreaming, compulsive masturbation, isolation, rebelliousness, chronic lying, poor body image, stealing and nightmares
‹#›
19
Sexual Homicides
Performance
Academic
Grade repetition
Did not complete high school
Poor performance in high school
Employment (prior to murder)
Military
Criminal record in military
Honourable/general discharge
Undesirable/dishonourable/medical discharge
‹#›
20
Sexual Homicides
Antecedent Behaviours
Pre-crime stress factors
Conflict with females
Parental conflict
Financial problems
Employment problems
Marital problems
Additional stress factors
Frame of mind
Frustration
Hostility and anger
Agitation
Excitement
Internalised distress
– nervousness, depression, fear, calm, confusion
Precrime planning
Precrime actions
Increased criminal or violent activities
Looking for victims
Victim selection
Triggering factors
‹#›
21
Sexual Homicides
The offence
The sexual element of the murder
Subtle vs. overt sexual acts
Rape-murder
Mutilation-murder
‹#›
22
Vulnerability
It doesnt matter whether youre selling hotdogs, newspapers or pussy, when you sell it on the street, somebodys going to bash you over the head and try to take it from you.“
Monet, 47yrs, sex worker from California
‹#›
23
Vulnerability
“Obviously if you are going to attack a woman, the easiest target is a prostitute. She’ll get willingly into your car…the first she knows about it is when it all goes wrong. Up until then she’s been totally co-operative. There’s no other victim you could find that would do that, [who] is not in some way connected to you… Prostitutes are ideal.”
(Vice-squad officer. In Benson, 1998, p.12)
‹#›
24
Serial Murderer Typology
Holmes & Holmes (1998) - 5 types of serial murderer
Visionary
Mission
Lust
Thrill
Power/Control
‹#›
25
Serial Murderer Typology
Visionary
Acting on voices or visions from Gods, angels, devils
Commandments/direction to kill certain individuals (e.g., prostitutes, atheists etc.)
Crime Characteristics: Typically leaves chaotic crime scene – scattering belongings, clothing spread around, weapon left in victim, ransacking, bludgeoning
‹#›
26
Serial Murderer Typology
Mission
Focused on certain group or type of person as ‘unacceptable’ or valueless (and world is better free of them)
Crime Characteristics: Murder weapon missing, firearm use, bludgeoning, throat cutting
‹#›
27
Serial Murderer Typology
Lust
Subcategory of hedonistic killers
Process of fulfilling sexual fantasy
Sex is the point of the process
Crime Characteristics: multiple sex acts, penetration with object, vaginal rape, abdominal mutilation, torture, violence to genitals
‹#›
28
Serial Murderer Typology
Thrill
Subcategory of hedonistic killers
Enjoy process of killing
Pleasure and excitement from killing
Death deliberately extended (to prolong)
Crime Characteristics: Similar to lust (torture, vaginal rape, penetration with objects); Bite marks, manual or ligature strangulation, body covered after death and concealed in isolated spot; Possible burns on victim
‹#›
29
Serial Murderer Typology
Power/Control
Gratification in killing is that the killer has control
Dominance is motive
Enjoyment of process leads to prolonging sequence
Crime Characteristics: Restraints, torture, gagging, body parts missing, evidence tampered with, decapitation, vaginal rape, ligature strangulation, body concealed
‹#›
30
Quick tip:
Keppel & Birnes – Signature Killers
‹#›
31
Case Study: Peter Sutcliffe
AKA Yorkshire Ripper
1975-1980
13 Murders, and attacks on a
further 7 women
Given 20 life sentences
‹#›
32
Case Study: Peter Sutcliffe
‹#›
33
Case Study: Peter Sutcliffe
Dear Sir
I am sorry I cannot give my name for obvious reasons. I am the Ripper. Ive been dubbed a maniac by the Press but not by you, you call me clever and I am. You and your mates havent a clue that photo in the paper gave me fits and that bit about killing myself, no chance. Ive got things to do. My purpose to rid the streets of them sluts. My one regret is that young lassie McDonald, did not know cause changed routine that nite. Up to number 8 now you say 7 but remember Preston 75, get about you know. You were right I travel a bit. You probably look for me in Sunderland, dont bother, I am not daft, just posted letter there on one of my trips. Not a bad place compared with Chapeltown and Manningham and other places. Warn whores to keep off streets cause I feel it coming on again.
Sorry about young lassie. Yours respectfully
Jack the Ripper
Might write again later I not sure last one really deserved it. Whores getting younger each time. Old slut next time I hope. Huddersfield never again, too small close call last one.
‹#›
34
Case Study: Steve Wright
AKA Suffolk Strangler
October-December 2006
5 Murders
Given life sentences
‹#›
35
Case Study: Steve Wright
Gemma Adams, 25, lived in Ipswich and disappeared on 15th November 2006 at about 01.15 - her body was found on 2nd December in a river – she was naked but had not been sexually assaulted
Tania Nicol, 19, from Ipswich disappeared on 30th October 2006 and was reported missing on the 1st November. Her body was found on the 8th December in a river and there was no evidence of sexual assault
Annette Nicholls, 29, from Ipswich, disappeared on the 5th December 2006 at 21.50 and her body was found on the 12th December, naked but with no evidence of sexual assault
Anneli Alderton, 24, was three months pregnant when she went missing on the 3rd December 2006. Her body was found on the 10th December and she had been asphyxiated and was discovered naked but with no sign of sexual assault
Paula Clennell, 24, disappeared on 10th December in Ipswich at about 00.20. Her body was found on the 12th December naked but not sexually assaulted. A post mortem revealed that she had been killed by a compression of her throat
‹#›
36
Case Study: Steve Wright
Psychological Speculations (‘Profiling’)
Keith Ashcroft (forensic psychologist)
The murderer is deliberately “taunting” police - the person “probably has some massive grudge against the police force, probably even in Suffolk” and wants to make the police look inadequate
Joseph Diaz (criminologist)
commented that the fact the bodies were dumped in water suggests that the killer is of above average intelligence, because he knows physical evidence will be washed away
Further comment in the Daily Telegraph speculates the killer probably has a dominant mother, and is not in a stable relationship with a woman – possibly a virgin
David Canter (Forensic/Investigative Psychologist)
comments in The Times: His first murder was likely to be a carefully considered attempt to hide some other crime: killing the victim because she was a crucial witness.
‹#›
37
Detection Avoidance
Dr Claire Ferguson’s Area of Expertise
Any behaviours offender uses to hide, destroy, or manipulate evidence in order to avoid detection or apprehension by police
Forensic Awareness also included
CONTEXT IS EVERYTHING
Examples:
Destroying evidence
Disposing of victims body
Protecting identity
Acting on the victim (posing)
Or environment (staging)
Securing alibi
‹#›
38
Detection Avoidance
‹#›
39
Detection Avoidance
‹#›
40
Detection Avoidance
‹#›
41
HINT: this is a good chance to ask me anything
‹#›
42
Terrorism
Difficult to study (context/situation dependent)
Use of force or violence
Individuals or groups
Directed to civilian population
Intended to instil fear
A means of coercing political or social change
‹#›
43
Terrorism
NOT A MODERN DEVELOPMENT,
But
B&B claims that globalisation and concomitant ease of travel, commerce and spread of information has made terrorism a modern threat. But the Baader-Meinhof, Che and IRA were operating with considerable threat.
‹#›
44
Terrorism
International vs Domestic
Distinction is also made between international terrorists and domestic or home grown terrorists but sometimes this can be blurred.
McVeigh was clearly a domestic terrorist
But London 2005 bombers were home grown but related to Islamic terrorists
‹#›
45
Terrorism
International vs Domestic
The critical issue in this distinction is that historically home grown terrorists have been a much greater threat than international terrorists. See Oklahoma City and Tokyo but also note that Madrid, London and Bali were also home grown.
Some home grown terrorists might be considered to be international because of their international links.
‹#›
46
QUICK TIP
Lone-Actor Terrorists (Gill, 2015)
UCL
Grievance Project (@Grievance_ERC)
LATs may have ‘contact’ with others,
but effectively work alone
Psychological motivations
Harder to track
Sequential methods used (among many others)
‹#›
47
Keatley & Gill
CSA – Lone Actor Terrorists
‹#›
48
Keatley, Forsyth, & Clarke
Linguistic Pattern Matching
‹#›
49
Terrorism
Categorization
Who are the terrorists?
Very heterogeneous thus categorisation is very difficult
Islamic terrorists: 60\% higher education; 3/4 higher socio-economic status; wide age range; but some were from menial backgrounds with little opportunity
B&B suggests two approaches: classification based on interest of the group and a typology based on motivation of members.
‹#›
50
Terrorism
Classifications – interest or group based:
Right wing terrorists – nationalistic, anti-global, conspiracy theorists
Left wing terrorists – generally aiming at removing disadvantage, discrimination
Special interest extremist for example protecting the environment
‹#›
51
Terrorism
Typology – offender motivation
Rationally motivated – clear, rational, achievable objectives; generally aim for infrastructure damage as opposed to loss of life. Extreme environmental groups (Greenpeace?) fit in this category – instrumental aggression?
Psychologically motivated – appears to be a category for individuals who have problems and engage in terrorism – hostile aggression?
Culturally motivated – individuals who are responding to a perceived threat to their values, beliefs etc – see Tedeschi and Felson “threats” in aggression lecture
‹#›
52
Terrorism
Why join?
B&B points out that for the disadvantaged it may represent a form of escape – an alternative to reactive depression or learned helplessness.
But given that many are successful and functional why do they join?
B&B suggests that it is driven by perceived persecution from outside groups. True for some, eg Palestinian terrorists, Boadicea.
But how does that explain Osama Bin Laden, a wealthy Saudi who never experienced any persecution, or the London 2005 bombers who were relatively integrated into British society etc.
‹#›
53
Terrorism
Why join?
Trying to understand terrorism that is not driven by direct persecution:
Start with frustration aggression hypothesis – it is a sound aggression model
Identify the frustration – Tedeschi and Felson’s threat to beliefs
This may explain a motivation but it doesn’t explain how they join or why they engage in violence.
‹#›
54
Terrorism
How do they join?
Ever seen an advertisement for ‘terrorist wanted – must be willing to kill self and others’
Can the organisations advertise, recruit etc?
In most countries it would be illegal and in any case it would be too easy for anti-terrorists to respond.
INTERNET IS MAKING THIS EASIER
‹#›
55
Lavf56.25.101
CATEGORIES
Economics
Nursing
Applied Sciences
Psychology
Science
Management
Computer Science
Human Resource Management
Accounting
Information Systems
English
Anatomy
Operations Management
Sociology
Literature
Education
Business & Finance
Marketing
Engineering
Statistics
Biology
Political Science
Reading
History
Financial markets
Philosophy
Mathematics
Law
Criminal
Architecture and Design
Government
Social Science
World history
Chemistry
Humanities
Business Finance
Writing
Programming
Telecommunications Engineering
Geography
Physics
Spanish
ach
e. Embedded Entrepreneurship
f. Three Social Entrepreneurship Models
g. Social-Founder Identity
h. Micros-enterprise Development
Outcomes
Subset 2. Indigenous Entrepreneurship Approaches (Outside of Canada)
a. Indigenous Australian Entrepreneurs Exami
Calculus
(people influence of
others) processes that you perceived occurs in this specific Institution Select one of the forms of stratification highlighted (focus on inter the intersectionalities
of these three) to reflect and analyze the potential ways these (
American history
Pharmacology
Ancient history
. Also
Numerical analysis
Environmental science
Electrical Engineering
Precalculus
Physiology
Civil Engineering
Electronic Engineering
ness Horizons
Algebra
Geology
Physical chemistry
nt
When considering both O
lassrooms
Civil
Probability
ions
Identify a specific consumer product that you or your family have used for quite some time. This might be a branded smartphone (if you have used several versions over the years)
or the court to consider in its deliberations. Locard’s exchange principle argues that during the commission of a crime
Chemical Engineering
Ecology
aragraphs (meaning 25 sentences or more). Your assignment may be more than 5 paragraphs but not less.
INSTRUCTIONS:
To access the FNU Online Library for journals and articles you can go the FNU library link here:
https://www.fnu.edu/library/
In order to
n that draws upon the theoretical reading to explain and contextualize the design choices. Be sure to directly quote or paraphrase the reading
ce to the vaccine. Your campaign must educate and inform the audience on the benefits but also create for safe and open dialogue. A key metric of your campaign will be the direct increase in numbers.
Key outcomes: The approach that you take must be clear
Mechanical Engineering
Organic chemistry
Geometry
nment
Topic
You will need to pick one topic for your project (5 pts)
Literature search
You will need to perform a literature search for your topic
Geophysics
you been involved with a company doing a redesign of business processes
Communication on Customer Relations. Discuss how two-way communication on social media channels impacts businesses both positively and negatively. Provide any personal examples from your experience
od pressure and hypertension via a community-wide intervention that targets the problem across the lifespan (i.e. includes all ages).
Develop a community-wide intervention to reduce elevated blood pressure and hypertension in the State of Alabama that in
in body of the report
Conclusions
References (8 References Minimum)
*** Words count = 2000 words.
*** In-Text Citations and References using Harvard style.
*** In Task section I’ve chose (Economic issues in overseas contracting)"
Electromagnetism
w or quality improvement; it was just all part of good nursing care. The goal for quality improvement is to monitor patient outcomes using statistics for comparison to standards of care for different diseases
e a 1 to 2 slide Microsoft PowerPoint presentation on the different models of case management. Include speaker notes... .....Describe three different models of case management.
visual representations of information. They can include numbers
SSAY
ame workbook for all 3 milestones. You do not need to download a new copy for Milestones 2 or 3. When you submit Milestone 3
pages):
Provide a description of an existing intervention in Canada
making the appropriate buying decisions in an ethical and professional manner.
Topic: Purchasing and Technology
You read about blockchain ledger technology. Now do some additional research out on the Internet and share your URL with the rest of the class
be aware of which features their competitors are opting to include so the product development teams can design similar or enhanced features to attract more of the market. The more unique
low (The Top Health Industry Trends to Watch in 2015) to assist you with this discussion.
https://youtu.be/fRym_jyuBc0
Next year the $2.8 trillion U.S. healthcare industry will finally begin to look and feel more like the rest of the business wo
evidence-based primary care curriculum. Throughout your nurse practitioner program
Vignette
Understanding Gender Fluidity
Providing Inclusive Quality Care
Affirming Clinical Encounters
Conclusion
References
Nurse Practitioner Knowledge
Mechanics
and word limit is unit as a guide only.
The assessment may be re-attempted on two further occasions (maximum three attempts in total). All assessments must be resubmitted 3 days within receiving your unsatisfactory grade. You must clearly indicate “Re-su
Trigonometry
Article writing
Other
5. June 29
After the components sending to the manufacturing house
1. In 1972 the Furman v. Georgia case resulted in a decision that would put action into motion. Furman was originally sentenced to death because of a murder he committed in Georgia but the court debated whether or not this was a violation of his 8th amend
One of the first conflicts that would need to be investigated would be whether the human service professional followed the responsibility to client ethical standard. While developing a relationship with client it is important to clarify that if danger or
Ethical behavior is a critical topic in the workplace because the impact of it can make or break a business
No matter which type of health care organization
With a direct sale
During the pandemic
Computers are being used to monitor the spread of outbreaks in different areas of the world and with this record
3. Furman v. Georgia is a U.S Supreme Court case that resolves around the Eighth Amendments ban on cruel and unsual punishment in death penalty cases. The Furman v. Georgia case was based on Furman being convicted of murder in Georgia. Furman was caught i
One major ethical conflict that may arise in my investigation is the Responsibility to Client in both Standard 3 and Standard 4 of the Ethical Standards for Human Service Professionals (2015). Making sure we do not disclose information without consent ev
4. Identify two examples of real world problems that you have observed in your personal
Summary & Evaluation: Reference & 188. Academic Search Ultimate
Ethics
We can mention at least one example of how the violation of ethical standards can be prevented. Many organizations promote ethical self-regulation by creating moral codes to help direct their business activities
*DDB is used for the first three years
For example
The inbound logistics for William Instrument refer to purchase components from various electronic firms. During the purchase process William need to consider the quality and price of the components. In this case
4. A U.S. Supreme Court case known as Furman v. Georgia (1972) is a landmark case that involved Eighth Amendment’s ban of unusual and cruel punishment in death penalty cases (Furman v. Georgia (1972)
With covid coming into place
In my opinion
with
Not necessarily all home buyers are the same! When you choose to work with we buy ugly houses Baltimore & nationwide USA
The ability to view ourselves from an unbiased perspective allows us to critically assess our personal strengths and weaknesses. This is an important step in the process of finding the right resources for our personal learning style. Ego and pride can be
· By Day 1 of this week
While you must form your answers to the questions below from our assigned reading material
CliftonLarsonAllen LLP (2013)
5 The family dynamic is awkward at first since the most outgoing and straight forward person in the family in Linda
Urien
The most important benefit of my statistical analysis would be the accuracy with which I interpret the data. The greatest obstacle
From a similar but larger point of view
4 In order to get the entire family to come back for another session I would suggest coming in on a day the restaurant is not open
When seeking to identify a patient’s health condition
After viewing the you tube videos on prayer
Your paper must be at least two pages in length (not counting the title and reference pages)
The word assimilate is negative to me. I believe everyone should learn about a country that they are going to live in. It doesnt mean that they have to believe that everything in America is better than where they came from. It means that they care enough
Data collection
Single Subject Chris is a social worker in a geriatric case management program located in a midsize Northeastern town. She has an MSW and is part of a team of case managers that likes to continuously improve on its practice. The team is currently using an
I would start off with Linda on repeating her options for the child and going over what she is feeling with each option. I would want to find out what she is afraid of. I would avoid asking her any “why” questions because I want her to be in the here an
Summarize the advantages and disadvantages of using an Internet site as means of collecting data for psychological research (Comp 2.1) 25.0\% Summarization of the advantages and disadvantages of using an Internet site as means of collecting data for psych
Identify the type of research used in a chosen study
Compose a 1
Optics
effect relationship becomes more difficult—as the researcher cannot enact total control of another person even in an experimental environment. Social workers serve clients in highly complex real-world environments. Clients often implement recommended inte
I think knowing more about you will allow you to be able to choose the right resources
Be 4 pages in length
soft MB-920 dumps review and documentation and high-quality listing pdf MB-920 braindumps also recommended and approved by Microsoft experts. The practical test
g
One thing you will need to do in college is learn how to find and use references. References support your ideas. College-level work must be supported by research. You are expected to do that for this paper. You will research
Elaborate on any potential confounds or ethical concerns while participating in the psychological study 20.0\% Elaboration on any potential confounds or ethical concerns while participating in the psychological study is missing. Elaboration on any potenti
3 The first thing I would do in the family’s first session is develop a genogram of the family to get an idea of all the individuals who play a major role in Linda’s life. After establishing where each member is in relation to the family
A Health in All Policies approach
Note: The requirements outlined below correspond to the grading criteria in the scoring guide. At a minimum
Chen
Read Connecting Communities and Complexity: A Case Study in Creating the Conditions for Transformational Change
Read Reflections on Cultural Humility
Read A Basic Guide to ABCD Community Organizing
Use the bolded black section and sub-section titles below to organize your paper. For each section
Losinski forwarded the article on a priority basis to Mary Scott
Losinksi wanted details on use of the ED at CGH. He asked the administrative resident